Tim Greene

Executive Editor

Tim Greene is executive editor of Network World.

Why the ‘cyber kill chain’ needs an upgrade

Why the ‘cyber kill chain’ needs an upgrade

One of the most popular models for analyzing cyberattacks doesn’t focus enough on what to do after adversaries break into networks successfully, which they inevitable will do, Black Hat 2016 attendees were told this week in Las...

FTC seeks research help from DEF CON hackers

FTC seeks research help from DEF CON hackers

The Federal Trade Commission made an appeal at DEF CON in Las Vegas this past week in hopes of getting hackers to help them crack down on manufacturers and service providers that leave customers vulnerable.

Black Hat conference trims insecure features from its mobile app

Black Hat has disabled features of its mobile application because attackers could have logged in as legitimate attendees, posted messages in their names and spied on the messages they sent.

John Deere is plowing IoT into its farm equipment

John Deere is plowing IoT into its farm equipment

John Deere is taking the Internet of Things out into the field by developing new technologies and embracing existing ones to boost the efficiency of prepping, planting, feeding and harvesting with the goal of improving per-acre crop...

Comprehensive software security for cars will take years

Comprehensive software security for cars will take years

Software security for automobiles is improving but it will take another three or four years until car manufacturers can put overarching security architecture in place, says Stefan Savage, the winner of the 2015 ACM-Infosys Foundation...

Raytheon names new enterprise security spinout Forcepoint

Raytheon names new enterprise security spinout Forcepoint

Forcepoint is the name of a new Raytheon joint venture that rolls up Raytheon Cyber Products, Websense (which the company bought an 80% share in last year), and next generation firewall vendor Stonesoft that Raytheon agreed to buy...

The biggest data breaches of 2015

The biggest data breaches of 2015

Data breaches made big news in 2015 as measured by a variety of criteria that range from the number of records compromised to the types of data stolen to the potential threat to specific groups such as children.

CISA won’t do a lot to turn threat intelligence into action

CISA won’t do a lot to turn threat intelligence into action

With the Cybersecurity Information Sharing Act (CISA) the feds are trying to make it more attractive to share threat intelligence, but it won’t do much to help businesses deal with the high cost of sorting through what can be an...

Good news for hackers: Some people still plug found USB sticks into their computers

Good news for hackers: Some people still plug found USB sticks into their computers

Of 200 USB sticks distributed at public places in Chicago, Cleveland, San Francisco and Washington, D.C., earlier this year, 17% wound up plugged into computers – some of them by IT pros - where they could have done all sorts of...

DARPA: Monitoring heat, electromagnetic and sound outputs could assess safety of IoT devices

DARPA: Monitoring heat, electromagnetic and sound outputs could assess safety of IoT devices

DARPA is looking for a platform that can tell whether Internet of Things devices have been hijacked based on fluctuations in the heat, electromagnetic waves and sound they put out as well as the power they use.

Crypto researchers: Time to use something better than 1024-bit encryption

Crypto researchers: Time to use something better than 1024-bit encryption

It’s possible for entities with vast computing resources – such as the NSA and major national governments - to compromise commonly used Diffie-Hellman keys, and over time more groups will be able to afford cracking them as computing...

Think Apple OS X is below the malware radar? Think again

Think Apple OS X is below the malware radar? Think again

Instances of Apple OS X malware are soaring this year, already totaling more than five times the number tallied over the previous five years combined, according to an in-house Bit9 + Carbon Black tally.

Think Apple OS X is under the malware radar? Think again

Think Apple OS X is under the malware radar? Think again

Instances of Apple OS X malware are soaring this year, already totaling more than five times the number tallied over the previous five years combined, according to an in-house Bit9 + Carbon Black report.

SANS: 20 critical security controls you need to add

SANS: 20 critical security controls you need to add

Prioritizing security measures is the first step toward accomplishing them, and the SANS Institute has created a list of the top 20 critical security controls businesses should implement.

Digital Guardian buys Code Green to gain data-loss prevention tech

Digital Guardian buys Code Green to gain data-loss prevention tech

Endpoint security vendor Digital Guardian has bought Code Green Networks, which makes data loss prevention appliances for businesses.

Report: Target failed to execute security basics

Report: Target failed to execute security basics

Target hired Verizon to figure out what was behind its 2013 data breach and Verizon found that the company’s security problems can be summed up as failure to do the basics.

Report: Target failed on security basics

Report: Target failed on security basics

Target hired Verizon to figure out what was behind its 2013 data breach and Verizon found that the company’s security problems can be summed up as failure to do the basics.

ZingBox: Startup brings Cisco, Stanford pedigree to IoT security

ZingBox: Startup brings Cisco, Stanford pedigree to IoT security

ZingBox, an Internet of Things security startup whose founders have ties to Cisco and Stanford University, is working on software that guards IoT devices from threats on the Internet.

Datiphy tracks what data is up to for security, auditing purposes

Datiphy tracks what data is up to for security, auditing purposes

Datiphy, a service provider founded in Taiwan, has bundled up its technology for sale as a software package to make inroads in the U.S. as a security/data auditing tool that detects and reports suspicious access to databases.

Malware enables cheating at online poker

Malware enables cheating at online poker

Online poker malware lets players cheat by getting a peek at cards held by opponents whose machines have been infected.

Load More