Tim Greene

Tim Greene covers security and keeps an eye on Microsoft for Network World.

U.S. cyberwar against ISIS could use methods and tactics criminals use against enterprises

New security fabric to unite Fortinet gear with that of other vendors

New security fabric to unite Fortinet gear with that of other vendors

Fortinet is embarking on a mission for its firewalls and other products and those of third-party vendors to work together to boost security across core networks, remote devices and the cloud.

Palo Alto Networks working to share threat intelligence

Palo Alto Networks working to share threat intelligence

Goal is rapid discovery of attacks and creating defenses against them. Recently Network World spoke about the hurdles left to get over with Palo Alto’s CSO Rick Howard.

Verodin carries out attacks safely to test network security

Verodin carries out attacks safely to test network security

A software platform from startup Verodin launches simulated attacks against live networks as a way to check the effectiveness of their defenses but also to train security operations personnel.

8 cyber security technologies DHS is trying to commercialize

8 cyber security technologies DHS is trying to commercialize

The Department of Homeland Security is publicizing eight new cyber security technologies developed under federal grants that are looking for private businesses to turn them into commercial products.

Proposed encryption legislation: What you need to know

Proposed encryption legislation: What you need to know

Questions and answers about first draft of how to deal with law enforcement’s need to access encrypted information

Senators release official draft of federal encryption legislation

Senators release official draft of federal encryption legislation

The first proposed federal encryption legislation has been released, and had it been established law earlier this year Apple would have had to provide the help the FBI asked for in accessing encrypted data on the iPhone used by a...

Power Shell is a powerful malware tool

Power Shell is a powerful malware tool

PowerShell used as a tool in compound malware attacks is becoming more common, with 38% of all attacks seen by CarbonBlack and its partners involving the native Windows scripting language.

Startup analyzes behavior to stop malware threats

Startup analyzes behavior to stop malware threats

Startup Seceon has joined a growing number of firms focused on quickly analyzing behaviors on corporate network to identify and prioritize threats that ought to be dealt with, cutting down on the manual work required to spot and stop...

Open source code is common, potentially dangerous, in enterprise apps

Open source code is common, potentially dangerous, in enterprise apps

The common practice of incorporating existing open source code in new software leaves the product open to unanticipated vulnerabilities that could be exploited by attackers.

Obama won’t advocate to crack encryption

Obama won’t advocate to crack encryption

President Obama won’t push for legislation that forces encryption vendors to decrypt when ordered to do so by a court, Reuters is reporting.

WhatsApp: The FBI’s worst nightmare

WhatsApp: The FBI’s worst nightmare

WhatsApp is encrypting all communications it supports, end-to-end, with no known way for anyone to decrypt it unless they are the authorized usesr of the endpoints involved, something that can’t be undone even under court orders...

Load More