Apple Builds Data Center in China, Promises No Backdoors

Apple on Wednesday announced the establishment of its first China-based data center in an effort to improve its services in the region and comply with recently implemented regulations, but the tech giant has promised not to build any backdoors into its systems. The new data center is located in China’s Guizhou province, which Apple selected…

How Active Intrusion Detection Can Seek and Block Attacks

Researchers at Black Hat USA will demonstrate how active intrusion detection strategies can help administrators detect hackers who are overly reliant on popular attack tools and techniques. Penetration testers as well as bad-guy hackers typically rely on several common attack tools to break into business networks. Enterprises defending their networks can flip the equation on…

Smart home device calls cops during domestic dispute

Amazon is kicking off its third annual Prime Day by slashing the cost of an Amazon Echo, cutting 50 percent off the price tag, and selling the Echo for only $89.99. Google is competing by cutting $64 from the price tag for a Google Home and Chromecast bundle, selling the two for $99.99. So, if you’ve been wanting to…

Social media is a cybersecurity risk for business

By itself, social media might not constitute a cyberthreat but once again,  employees who ignore best practices around security are making it easy for scammers. It’s even been described as the perfect hunting ground for illegal activity. Social media has also turned into a dandy reconnaissance tool that cybercriminals use to socially engineer their victims. When someone neglects their privacy settings or publicly posts personal notes and photos, they can leave cybercriminals free to use their information…

The quest for a more secure Dropbox alternative

If you use Dropbox, Google Drive, or Yandex.Disk, then you have no doubt appreciated the convenience of always having all of your important files handy on any device. A file can be shared with friends or coworkers in a second. However some find the data security on these popular services lacking, worrying that unauthorized people…

Understanding Looming Threats and the Need to Hunt With Anonymity

Situational awareness is critical in every kind of engagement. The internet is no exception. Effectively all modern conflicts take place, at least in part, online. To understand the threats you will inevitably face, you need to go hunting outside your perimeter. Only by surreptitiously monitoring and engaging with potential attackers and malware developers will you…

Privacy, security concerns grow for wearables

While Google Glass was not the success Google wanted it to be, there is no doubt that the wearable camera market is growing. People may have not been comfortable with the fact that random persons can record their action without them being aware of it, but most have no trouble with law enforcement agents, first…

Climbing the Security Maturity Ladder in Cloud

These five steps will insure that you achieve the broadest coverage for onboarding your most sensitive workloads. Astute CIOs are actively migrating to public cloud to take advantage of scalability, flexibility and inherent security at a lower cost. As Rob Alexander, CIO Capital One, said at the AWS re:Invent 2015 conference in Las Vegas, “We…