Cyber Defense

Akamai to Acquire Prolexic for Some $370 Million in Move to Bolster its DDoS Protection

TENAFLY, N.J. - Akamai Technologies announced that it had signed a definitive agreement to acquire Prolexic Technologies, Inc. for approximately $370 million, in a deal expected to close during the first half of 2014. Akamai said the deal would extend its web optimization and security offerings by adding cloud-based security solutions for protecting data centers

By |2013-12-06T00:00:00-05:00December 6th, 2013|Archive, Cyber Defense|

Security Models ? One Size Does Not Fit All

TENAFLY, N.J. - Security is a word that brings up many different images depending on your experience, profession or industry. At a University, not only is the context different than at a bank, but it is different depending on what you are trying to secure. I do not believe that providing security for an organization

By |2013-12-06T00:00:00-05:00December 6th, 2013|Archive, Cyber Defense|

UN May Promulgate Rules To Limit Digital Surveillance

NEW YORK - The United Nations may soon extend its rules on human rights to digital privacy, which could increase political pressure on the National Security Agency and agencies in other countries to establish limits on surveillance for a cloud computing era. Diplomats from Germany and Brazil helped drive the U.N. General Assembly's human rights

By |2013-12-04T00:00:00-05:00December 4th, 2013|Archive, Cyber Defense|

I am Not Satoshi – Security Researcher Debunks Rumors that He Is The Elusive Inventor Of Bitcoin

BIRMINGHAM - Recent speculation that Dustin Trammel is the mysterious inventor of Bitcoin and somehow connected to the Silk Road marketplace drove this Texas-based security researcher to post a denial to his website. Bitcoins are the first form of digital currency that, according to Satoshi Nakamoto the pseudonym for Bitcoin's elusive creator, does not rely

By |2013-11-27T00:00:00-05:00November 27th, 2013|Archive, Cyber Defense|

Google Expands Bug-Bounty To Cover Android Vulnerabilities

MOUNTAIN VIEW, Ca. - Google has expanded its bug-bounty program to cover vulnerabilities uncovered in Android. The program began with Chrome and expanded to Google Web sites and other open-source software projects. Under the program, people who find security holes get paid bounties. That often equates to a few hundred dollars, but particularly skilled attacks

By |2013-11-21T00:00:00-05:00November 21st, 2013|Archive, Cyber Defense|

3 U.S. Senators Say NSA Spying Not Necessary To Ensure U.S. Security

WASHINGTON DC - Three US senators with access to confidential NSA information don't see the agency's data-gathering methods as necessary to ensure US security. On Tuesday, Senators Mark Udall (D-Colorado), Ron Wyden (D-Oregon), and Martin Heinrich (D-New Mexico) filed an amicus brief on behalf of a lawsuit filed by several organizations that claims the National

By |2013-11-21T00:00:00-05:00November 21st, 2013|Archive, Cyber Defense|

Gartner Says Agility Is Primary Driver for Private Cloud Adoption; Predicts Increased Hybrid Cloud Acceptance

TENAFLY, N.J. - Private cloud computing is a reality for half of large enterprises with agility being the key driver, according to Gartner Inc. In a recent research report, "Private Cloud Matures, Hybrid Cloud Is Next," the industry analyst firm said cost was an important consideration as well. Security, often cited by IT professionals as

By |2013-11-21T00:00:00-05:00November 21st, 2013|Archive, Cyber Defense|