Expert Corner


Exploring the dynamics of the attacker economy

Global software companies are increasingly turning to attackers for help identifying security vulnerabilities in their offerings – and they’re not the only ones. Conservative government agencies are even beginning to welcome bug bounty hunters. …

cloud proliferation

Diffy: A triage tool for cloud-centric incident response

The Netflix Security Intelligence and Response Team (SIRT) has released Diffy, an open source triage tool that allows digital forensics and incident response teams to quickly pinpoint compromised hosts during a security incident on cloud …


Cybersecurity no longer top risk for telecom industry

Telecommunications executives have relegated disruption from new technologies to third place in their risk top 5: the number one risk identified by 60 telecom companies surveyed right now is exchange rate volatility, according to phone companies …


Capturing the conscience of the computing profession

After a two-year process that included extensive input from computing professionals around the world, ACM, the Association for Computing Machinery, has updated its Code of Ethics and Professional Conduct. The revised Code of Ethics addresses the …

Industry news

Whitepapers and insight