Tim Greene

Executive Editor

Tim Greene is executive editor of Network World.

Why the ‘cyber kill chain’ needs an upgrade

Why the ‘cyber kill chain’ needs an upgrade

One of the most popular models for analyzing cyberattacks doesn’t focus enough on what to do after adversaries break into networks successfully, which they inevitable will do, Black Hat 2016 attendees were told this week in Las...

FTC seeks research help from DEF CON hackers

FTC seeks research help from DEF CON hackers

The Federal Trade Commission made an appeal at DEF CON in Las Vegas this past week in hopes of getting hackers to help them crack down on manufacturers and service providers that leave customers vulnerable.

Black Hat conference trims insecure features from its mobile app

Black Hat has disabled features of its mobile application because attackers could have logged in as legitimate attendees, posted messages in their names and spied on the messages they sent.

John Deere is plowing IoT into its farm equipment

John Deere is plowing IoT into its farm equipment

John Deere is taking the Internet of Things out into the field by developing new technologies and embracing existing ones to boost the efficiency of prepping, planting, feeding and harvesting with the goal of improving per-acre crop...

Comprehensive software security for cars will take years

Comprehensive software security for cars will take years

Software security for automobiles is improving but it will take another three or four years until car manufacturers can put overarching security architecture in place, says Stefan Savage, the winner of the 2015 ACM-Infosys Foundation...

Raytheon names new enterprise security spinout Forcepoint

Raytheon names new enterprise security spinout Forcepoint

Forcepoint is the name of a new Raytheon joint venture that rolls up Raytheon Cyber Products, Websense (which the company bought an 80% share in last year), and next generation firewall vendor Stonesoft that Raytheon agreed to buy...

The biggest data breaches of 2015

The biggest data breaches of 2015

Data breaches made big news in 2015 as measured by a variety of criteria that range from the number of records compromised to the types of data stolen to the potential threat to specific groups such as children.

CISA won’t do a lot to turn threat intelligence into action

CISA won’t do a lot to turn threat intelligence into action

With the Cybersecurity Information Sharing Act (CISA) the feds are trying to make it more attractive to share threat intelligence, but it won’t do much to help businesses deal with the high cost of sorting through what can be an...

Good news for hackers: Some people still plug found USB sticks into their computers

Good news for hackers: Some people still plug found USB sticks into their computers

Of 200 USB sticks distributed at public places in Chicago, Cleveland, San Francisco and Washington, D.C., earlier this year, 17% wound up plugged into computers – some of them by IT pros - where they could have done all sorts of...

Think Apple OS X is under the malware radar? Think again

Think Apple OS X is under the malware radar? Think again

Instances of Apple OS X malware are soaring this year, already totaling more than five times the number tallied over the previous five years combined, according to an in-house Bit9 + Carbon Black report.

Report: Target failed on security basics

Report: Target failed on security basics

Target hired Verizon to figure out what was behind its 2013 data breach and Verizon found that the company’s security problems can be summed up as failure to do the basics.

Under DDoS attack? It could be just a distraction

Under DDoS attack? It could be just a distraction

When businesses are hit by noticeable DDoS attacks, three-quarters of the time those attacks are accompanied by another security incident, according to Kaspersky Lab.

Obama advisers: Encryption backdoors would hurt cybersecurity, net infrastructure vendors

Obama advisers: Encryption backdoors would hurt cybersecurity, net infrastructure vendors

Making encryption backdoors available to law enforcement would be bad for cybersecurity in general and hurt vendors that make encryption gear, a presidential advisory group says.

SYNful Knock router exploit isn’t going away soon

SYNful Knock router exploit isn’t going away soon

The SYNful Knock compromise of routers can implant software that creates backdoors to let attackers return over and over, a sophisticated endeavor that demonstrates the ingenuity of its creators, according to a member of the team that...

Check Point’s SandBlast sandbox spells R.I.P. for ROP attacks

Check Point’s SandBlast sandbox spells R.I.P. for ROP attacks

Check Point software upgrade counters a technique attackers have used to evade traditional sandboxes.

Dell Oro Group: Check Point, Palo Alto, Fortinet making gains in security appliances

There’s a shift among the top security vendors that has Cisco remaining at the top of the heap but with Check Point Software, Fortinet and Palo Alto Networks making gains and pressuring Juniper Networks, according to new research from...

Wyndham v. FTC: Corporate security pros need to lawyer up about data breach protection, experts say

Wyndham v. FTC: Corporate security pros need to lawyer up about data breach protection, experts say

Corporate security executives need to meet with their legal teams to find out if the way they protect customer data will keep them out of trouble with the Federal Trade Commission if it should be compromised in a data breach.

Black Hat 2015: Ransomware not all it’s cracked up to be

Black Hat 2015: Ransomware not all it’s cracked up to be

All ransomware is not created equal and therefore should not be universally feared, a researcher will tell the Black Hat 2015 conference this week.

Black Hat 2015: Cracking just about anything

Black Hat 2015: Cracking just about anything

Researchers at the Black Hat conference next week will show how to crack Internet routing protocols, malware-detecting honeypots radio-frequency ID gear that gates building access and more. They'll also offer tips on how to avoid...

LightCyber upgrades to speed shutdown of malicious activity

LightCyber is upgrading its endpoint detection and remediation platform so when it discovers bad behavior on the network it can also ID the machine and the exact process that’s causing it, then shut the malware down.

Load More