Archive | Security RSS feed for this archive
File photo of Germany's Chancellor Merkel using her mobile phone before a meeting at a European Union summit in Brussels

Snowden told us things we should have already known

Snowden’s stories of a far-reaching NSA shouldn’t come as much of a surprise to anyone working with Big Data. We’re entering a new age and the technology and techniques of the past won’t hold up. Just reading the headlines is all the evidence we need. German Chancellor Angela Merkel’s cell phone was being monitored by […]

Continue Reading
Massive security hole

Is the Internet of Things a gaping security chasm?

Kashmir Hill’s piece in Forbes, The Terrifying Search Engine That Finds Internet-Connected Cameras, Traffic Lights, Medical Devices, Baby Monitors and Power Plants, reports on a search engine, Shodan, built for the purpose of crawling for devices on the Internet, many of which are programmed to answer and are sometimes easy to hack. Among the devices […]

Continue Reading
Securing school data

Are you securing my kids’ data?

The following is a guest post by Catheryne Nicholson.  If you’re an educator or a developer building and using cool technology to help teachers, children and parents, I’d like to give you a Momma Bear’s piece of advice: if you collect or store information about my kids, secure it. The minute you start gathering data about […]

Continue Reading
Amber Alert

When software ate police work

If you live in California and had your phone turned on one evening  last week, you were probably startled to get a text from the statewide system that alerts residents to emergencies. Boulevard, CA AMBER Alert UPDATE: LIC/6WCU986 (CA) Blue Nissan Versa 4 door While it was startling for many, what it showed us was […]

Continue Reading

We’re headed for a surveillance society and that’s OK

The brouhaha over NSA’s PRISM project that involved spying on Verizon customers and asking Silicon Valley giants for access to their customer records is a bit of false indignation, if you ask me (what, you didn’t ask me?). First, there have been warnings for years about our loss of privacy. Secondly, and may more importantly, […]

Continue Reading
NSA monitors phone calls

Are we stupid? Of course the NSA crunchs our call data.

Most people working in technology are in some way part of the vast conversation taking place around Big Data. That has to be hundreds of thousands if not millions of individuals. “Powerful insights” is the commonly heard phrase. It should also be completely clear to the public by now that data in large enough sets, […]

Continue Reading
facial recognition

60 Minutes: “Say goodbye to anonymity”

In case you missed 60 Minutes on CBS last night, there’s a new challenge to privacy that is coming faster than people realize and was made more urgent by the terror attack in Boston a month ago. The 60 Minutes piece started with the following: The ability of computers to recognize faces has gotten a […]

Continue Reading
network security - locked

Information security avoids avoiding the avoidable…what the what?

The following is a guest post by Chima Njaka. This week TIBCO LogLogic has been taking part at InfoSec Europe, the largest Information Security Event in Europe.  According to initial reports, there are over 17,000 registrants at this year’s event.  We are at booth F50 and we hope to see you there. One of the […]

Continue Reading

Avoiding another 9/11 moment

In a speech last week, U .S. Defense Secretary Leon Panetta shocked many people with how real the threat is of a cyber attack on the U.S. and our infrastructure. In his talk to the Business Executives for National Security, Panetta painted a picture of an attack that would cause physical destruction and the loss […]

Continue Reading
Data Loss

Data: You can’t get it back once it’s gone

You’d have to be on another planet to miss the stories of data loss by major companies. It seems amazing that this could happen in an age of encryption, fire walls, and hyper-high tech security. Yet it does. As a consumer and technology professional, I’ve witnessed first hand that Data Loss Prevention (DLP) software, designed […]

Continue Reading
Julian Assange

Social media is the great equalizer

Wikileaks founder Julian Assange is once again in the news, this time holed up in the Ecuadorian Embassy in London. Regardless of how you feel about Wikileaks and the charges Assange faces in Sweden, the way this story has played out across the world is a remarkable Internet and social saga. Even ten years ago, […]

Continue Reading
Enterprise security

Security in an insecure world

In a recent TechCrunch article, Just Like Everything Else In The Enterprise Space, Security Is About To Be Disrupted, the author argues that the momentum of change in enterprise technology will roll over this space as well. I’m going to tell you why simply shopping for a security vendor may not be enough. The good […]

Continue Reading