Bob Brown

Bob Brown is the former news editor for Network World.

Staples hires its very first CISO

Cisco security researcher: Ransomware crowd big on customer service

Cisco security researcher: Ransomware crowd big on customer service

Cisco security research breaks down the anatomy of a cyberattack throughout the exploit kit infection chain, all the way to ransomware attacks and investigation into such breaches, at SecureWorld Boston event

Homeland Security issues call to action on IoT security

Homeland Security issues call to action on IoT security

U.S. Department of Homeland Security’s Robert Silvers says his purpose in speaking at the Security of Things Forum in Cambridge on Thursday wasn’t to scare anyone, but then he went ahead and called on everyone in the room to...

Heat map to show where burning need is for cybersecurity pros

Heat map to show where burning need is for cybersecurity pros

The National Institute of Standards and Technology (NIST) is funding creation of a heat map visualization tool that will show where cybersecurity jobs are open across the country. The first rendition should be out late next year.

A short history of Sony hacks

A short history of Sony hacks

The giant Japanese electronics company dazzled us with its Walkman and Discman in the late 70s/early 80s, as well as with its TVs, cameras and game consoles over the years. But things took a bad turn in 2005…

Sony BMG Rootkit Scandal: 10 Years Later

Sony BMG Rootkit Scandal: 10 Years Later

Hackers really have had their way with Sony over the past year, taking down its Playstation Network last Christmas Day and creating an international incident by exposing confidential data from Sony Pictures Entertainment in response...

Tech companies apologize for snafus

Tech companies apologize for snafus

Sorry situationImage by ThinkstockDespite all the technology advances that have rolled out this year, it’s also been a sorry state of affairs among leading network and computing vendors, along with businesses that rely heavily on...

Data breaches lead long line of reasons for apologies this year

Data breaches lead long line of reasons for apologies this year

Google, Microsoft, Facebook and the rest get in the sorry line.

McAfee’s most dangerous cyber celebrities of 2014

McAfee’s most dangerous cyber celebrities of 2014

Musicians dominate the 2014 list of celebs you might not want to search on for fear of malware

5 cool new security research breakthroughs

University and vendor researchers are congregating in San Diego this week at USENIX Security ’14 to share the latest findings in security and privacy, and here are 5 that jumped out to me as being particularly interesting.

25 cool cloud, security & mobile startups to watch

There's no scientific formula behind this list: It's just a bunch of new-ish, mainly enterprise-focused computing and networking companies that have launched, received fresh funding of late or otherwise popped onto my radar screen.

12 terrific tech and security-related TED talks

12 terrific tech and security-related TED talks

From thoughts on the NSA spying controversy, to an explanation of how one presenter hacked her own online dating profile

Load More