Remove Accountability Remove Big data Remove Technology
article thumbnail

Cybersecurity for the Public Interest

Schneier on Security

It's an impassioned debate, acrimonious at times, but there are real technologies that can be brought to bear on the problem: key-escrow technologies, code obfuscation technologies, and backdoors with different properties. Public-interest technology isn't new. We need public-interest technologists.

article thumbnail

Cybersecurity for the Public Interest

Schneier on Security

It's an impassioned debate, acrimonious at times, but there are real technologies that can be brought to bear on the problem: key-escrow technologies, code obfuscation technologies, and backdoors with different properties. Public-interest technology isn't new. We need public-interest technologists.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SHARING INTEL: Here’s why it has become so vital to prioritize the security-proofing of APIs

The Last Watchdog

The threat intelligence platforms and detection and response systems installed far and wide, in SMBs and large enterprises alike, simply are not doing a terrific job at accounting for how APIs are facilitating multi-staged network breaches. And to produce signals useful to security teams, you need to analyze this data, in real time.”.

Big data 240
article thumbnail

Chinese Antivirus Firm Was Part of APT41 ‘Supply Chain’ Attack

Krebs on Security

” Once inside of a target organization, the hackers stole source code, software code signing certificates, customer account data and other information they could use or resell. “SonarX served as an easily searchable repository for social media data that previously had been obtained by CHENGDU 404.” Image: DOJ.

Antivirus 363
article thumbnail

Supply Chain Security 101: An Expert’s View

Krebs on Security

— had allegedly inserted hardware backdoors in technology sold to a number of American companies. Sager said he hadn’t heard anything about Supermicro specifically, but we chatted at length about the challenges of policing the technology supply chain. Below are some excerpts from our conversation. TS: Exactly.

article thumbnail

GUEST ESSAY: Taking proactive steps to heal the planet — by reducing the impact of video streaming

The Last Watchdog

Related: Big data can foster improved healthcare Within that, video represents over 80 percent of the traffic that flows through this global network which is growing rapidly at about 25 percent per year. It is in this context that it is important to focus on the details of video technology.

article thumbnail

How to Protect Privacy and Build Secure AI Products

Security Affairs

AI systems are transforming technology and driving innovation across industries. How to Protect Privacy and Build Secure AI Products AI systems are transforming technology and driving innovation across industries. However, their unpredictability raises significant concerns about data security and privacy.