Brian Prince

Trojan Tied to RSA SecureID Breach Linked to Multiple Cyber-Campaigns

Dell SecureWorks has connected malware used in the RSA SecureID breach to attack campaigns going back several years that have targeted companies in countries around the globe.Using a Remote...

BlackBerry, Mozilla Team Up to Develop Free Web Security Testing Tool

Security experts at BlackBerry and Mozilla have teamed up to develop a testing tool aimed at discovering and fixing software vulnerabilities in Web browsers.The two companies are working together...

First Ponzi Scheme Involving Bitcoins Results in Texas Man’s Arrest

A Texas man and his company has been charged by the U.S. Securities and Exchange Commission (SEC) for defrauding investors in a Ponzi scheme involving bitcoins, a virtual currency...

Black Hat: Don’t Blindly Trust Vulnerability Data

Numbers never lie—except when they are used to draw false conclusions. And if those false conclusions are part of an IT security strategy, then nothing good can happen.Just ask...

Researcher Proposes Using Machine Learning to Improve Network Defense

Getting the most out of mountains of log data can be trying to say the least.In a conference where many are focused on defeating security, independent researcher Alexandre Pinto...

Latest Posts

IBM Sets Another Smallness Record with 2nm Chip Blueprints

Okay, now that IBM has revealed its 2nm chip design and process blueprint, what's next? A virtual chip? Two nanometers is smaller in width...

Dell Unveils, Explains APEX ‘Portfolio-as-a-Service’

In one of its busiest news-making days in the last few years, Dell EMC on May 5 at its  virtualized Dell Technologies World unveiled...

Dell-VMware Split a Hot Topic for IT Watchers

An old Bob Dylan song titled “The Times They are A-Changin' ” reminds me of what’s going on in tech today. The reality is...

Why It’s Critical to Manage Privileges and Access Across Your Multi-Cloud Environments

Conventional approaches to privileged access and identity management are ineffective in today’s cloud-oriented DevSecOps environments. The concept of least privilege access still remains foundational...

Five Hidden Costs in Code Migration: How to Avoid Surprise Expenses

Migration to the cloud is in full flight. The most complex challenge involved in completing these migrations is not moving the data but migrating...