article thumbnail

IDG Contributor Network: Cyber crime as a service forces changes in information security

Network World

Just use Google to learn how to access the Dark Web, and you can find hackers who, for a price, are more than happy to write malware, create highly effective spear phishing campaigns and develop bogus websites for harvesting login credentials. Cyber crime has been commercialized.

article thumbnail

Google Cloud’s $5.4B Mandiant deal accelerates cybersecurity race with Microsoft and Amazon

GeekWire

Google Cloud CEO Thomas Kurian calls the Mandiant acquisition “an opportunity to deliver an end-to-end security operations suite.” ” (Google File Photo). Google’s agreement to buy cybersecurity company Mandiant for $5.4 Analysts are divided over whether Google’s move signals more deals ahead.

Google 102
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Bad Actor Using New Method to Avert Detection, Google Discovers

SecureWorld News

Google recently landed on one of these techniques while tracking hackers in this ongoing game of cat-and-mouse. In a blog post, Neel Mehta, Information Security lead for Google, explains how a hacker has managed to break certificate code parsing to invade email inboxes and infect users with malware. “The

Google 61
article thumbnail

Tech Companies Will Alert Users of Data Demands

CTOvision

With the current public attention on information security and privacy, major tech companies’ increasing reluctance to cooperate with law enforcement officers – in this case, by no longer handing over American data without their notification – is an important trend. By ShannonPerry.

Company 264
article thumbnail

Second Factor Authentication With Security Keys

CTOvision

With the movement of our personal and business critical data to the ‘cloud’, and directed attacks on that data, many of us make use of stronger security through use two-factor authentication. I know everyone reading this has two-factor turned on for iCloud, Google Services, and DropBox! You will see a tab that says ‘Security Keys’.

article thumbnail

Tech Moves: Zulily hires Nike exec as new CTO; Google vet Phil Bogle joins Kalshi; Auth0 adds CISO

GeekWire

Phil Bogle , a longtime Seattleite who spent 11 years at Google, is now director of engineering at Kalshi , a San Francisco startup that runs a regulated exchange for trading directly on the outcomes of future events. Seattle-area identification security startup Auth0 hired Jameeka Green Aaron as its new chief information security officer. .

CTO Hire 120
article thumbnail

Continued Controversy over Smartphone Encryptions

CTOvision

With Edward Snowden’s revelations, the myriad of recent information breaches at large corporations, and the extraordinary level of digitalization in our country, the American public has never placed a higher value on cyber security. CTOVision covered the story here. My piece @WIRED : [link] #ComeyCrypto. Comey Privacy'