Stories by Tim Greene

HPE to buy Cray, offer HPC as a service

High-performance computing offerings from HPE plus Cray could enable things like AI, ML and digital twins for entire enterprise networks.

Written by Tim Greene18 May 19 03:51

6 vulnerabilities to watch for on the factory floor

Industrial control systems (ICS) that run the valves and switches in factories may suffer from inherent weaknesses that cropped up only after they were installed and the networks they were attached to became more widely connected.

Written by Tim Greene13 April 17 04:01

Trend Micro report: Ransomware booming

The profitability of ransomware made it the top cyber threat last year in two categories: the number of attacks and the amount of money generated for crooks, according to a Trend Micro lookback on data it collected from its customers.

Written by Tim Greene01 March 17 04:24

RSA: Watch out for a new weapon - your own data

As tens of thousands of the world’s top security pros gather at RSA Conference 2017 they are being called upon to watch out for a new threat: their own data.

Written by Tim Greene16 Feb. 17 01:06

Cisco: Spam is making a big-time comeback

Spam is making a surprising resurgence as a threat to corporate security and becoming a more significant carrier of attacks as varied as spear phishing, ransomware and bots, according to Cisco’s 2017 Annual Cybersecurity Report.

Written by Tim Greene01 Feb. 17 05:58

Lessons for corporate IT from Geek Squad legal case

The life of the corporate desktop team can turn into a legal nightmare quickly if end users haven’t agreed that it’s OK for techs to search their machines, something that has come to light in a California child pornography case involving Best Buy’s Geek Squad.

Written by Tim Greene13 Jan. 17 03:35

RSA: Expect business as usual now that Dell owns it

Enterprises should expect business as usual from RSA in the wake of its being swept up by Dell this week in the largest tech deal ever, with company executives saying it will retain a good deal of autonomy to carry out its strategic plans.

Written by Tim Greene09 Sept. 16 08:34

Why the ‘cyber kill chain’ needs an upgrade

One of the most popular models for analyzing cyberattacks doesn’t focus enough on what to do after adversaries break into networks successfully, which they inevitable will do, Black Hat 2016 attendees were told this week in Las Vegas.

Written by Tim Greene06 Aug. 16 03:21

Gartner on doing business in China: Privacy? What’s that?

Jie Zhang says that as a child in China she played a game picking up marbles with chopsticks and performing the delicate task of carrying them to another room without dropping them. That’s what doing business in China is like for Westerners, she told a breakfast gathering today at Gartner’s Security and Risk Management Summit.

Written by Tim Greene17 June 16 00:50