HomeBlogsSecurity Watch

Security Watch

Is Security a Game of Chess or Poker?

TORONTO—Metaphors are always a fun and easy way to try to describe complicated topics. In the security world, metaphors have long been part of...

Do You Want a Shirt With Your Vulnerability Report?

Security research should not be a thankless task; it should be a task that is celebrated, rewarded and, more importantly, acted on with all...

Windows Azure Cloud Platform Gets Two-Factor Authentication–Big Time

Whenever anyone asks me if the cloud is secure, I typically have a very simple answer: The cloud is no more and no less...

Security in a Post-PRISM World

NEW ORLEANS—Over the last few months, a whole lot of people have been very worried about the privacy of their information. The revelation that...

Microsoft Warns About New IE Security Flaw

A week after Microsoft patched its Internet Explorer (IE) web browser for 10 privately reported security issues, the company on Sept. 17 warned about...

Microsoft Fumbles Outlook Update

Microsoft is once again facing user backlash over a failed patch update cycle.The first Tuesday of every month is known as Patch Tuesday at...

Apple Fingerprints, Keychain: Why Randomness Matters

This week, Apple's announcement of the new iPhone 5S with an integrated biometric fingerprint reader for device access has got a lot of attention....

NSA Bullrun, 9/11 and Why Enterprises Should Walk Before They Run

In recent years, nearly every time I've seen the National Security Agency at a security event (they're usually out in a recruiting capacity), they...

Password Lies, Truth and Google Authenticator

Every day, we all use passwords to access our email, our servers, our systems—our digital lives. They are often the only thing that stands...

How Did Syrian Electronic Army Take Down The New York Times?

Late yesterday afternoon, my twitterstream lit up like fireworks that The New York Times Website was down. Once again rampant early speculation was that...