Brian Prince

Trojan Tied to RSA SecureID Breach Linked to Multiple Cyber-Campaigns

Dell SecureWorks has connected malware used in the RSA SecureID breach to attack campaigns going back several years that have targeted companies in countries around the globe.Using a Remote...

BlackBerry, Mozilla Team Up to Develop Free Web Security Testing Tool

Security experts at BlackBerry and Mozilla have teamed up to develop a testing tool aimed at discovering and fixing software vulnerabilities in Web browsers.The two companies are working together...

First Ponzi Scheme Involving Bitcoins Results in Texas Man’s Arrest

A Texas man and his company has been charged by the U.S. Securities and Exchange Commission (SEC) for defrauding investors in a Ponzi scheme involving bitcoins, a virtual currency...

Black Hat: Don’t Blindly Trust Vulnerability Data

Numbers never lie—except when they are used to draw false conclusions. And if those false conclusions are part of an IT security strategy, then nothing good can happen.Just ask...

Researcher Proposes Using Machine Learning to Improve Network Defense

Getting the most out of mountains of log data can be trying to say the least.In a conference where many are focused on defeating security, independent researcher Alexandre Pinto...

Latest Posts

How Tech Companies Can Boost Cyber Defenses: Building a Cyber-First Culture

Today’s accelerated pace of digital transformation brings significant opportunities for businesses to grow and drive value for shareholders. At the same time, the rise...

Zoomtopia: AI and Video to Power Healthcare

At the recent Zoomtopia event, the company touted its ability to power digital healthcare. Zoom already integrates with popular electronic health record (EHR) systems, such...

eWEEK eSPEAKS Video Podcast with James Maguire

Episode 32: Semperis’s Mickey Bresman: How to Secure Your Active Directory Mickey Bresman, Co-founder and CEO of Semperis, provides three tips for securing your Active...

DevOps or ‘DevOops’: Three Tips for Successful DevOps

Throughout my career as an IT consultant, working with various platforms and technologies, I’ve encountered a myriad of terms pitched to me to explain...

Using Personal Data for Analytics Requires Balancing Accessibility and Security

Digital transformation of financial services is driving an increasingly automated analytics process in which personally identifiable information (PII) about borrowers is transmitted and stored...