Tim Greene

Executive Editor

Tim Greene is executive editor of Network World.

Fortinet upgrades for better cloud, SD-WAN protection

Fortinet upgrades for better cloud, SD-WAN protection

Fortinet has rolled out a new version of its FortiOS operating system that gives customers the ability to manage security capabilities across their cloud assets and software-defined wide area networking (SD-WAN) environments.

Startup founded by FireEye alum goes after FireEye

Startup founded by FireEye alum goes after FireEye

SlashNext, a startup formed by a former FireEye engineer, uses machine learning and artificial intelligence to detect and prevent threats from causing harm.

McAfee: Trend indicates 2017 will be bumper year for new malware

McAfee: Trend indicates 2017 will be bumper year for new malware

A cycle of increasing new malware is well underway and could last the rest of this year if a trend established over the past two years continues.

Privacy rollback can cause headaches for corporate security pros

Privacy rollback can cause headaches for corporate security pros

Corporate security pros can add a new task to their busy days: handling panicky employees worried about privacy who are using the onion router (Tor) browser as a way to protect their online activity.

McAfee on its own as independent security vendor

McAfee on its own as independent security vendor

McAfee has officially spun out from Intel, dumping the name Intel Security and under new majority ownership that has deep pockets to help the company more aggressively acquire technology via mergers and acquisitions to supplement its...

Beyond Trust: privilege, vulnerability management available through Azure

Beyond Trust: privilege, vulnerability management available through Azure

Users of Azure cloud services have a new option for stopping the misuse of privileges as well as managing vulnerabilities through an alliance with Beyond Trust.

Non-malware attacks grow – there are tools for IT security to fight back with

Non-malware attacks grow – there are tools for IT security to fight back with

More and more attackers are carrying out their work without using malware so they can evade detection by traditional, file-based security platforms, which presents a tough problem for security pros trying to defend against them.

FBI warns of attacks on anonymous FTP servers

FBI warns of attacks on anonymous FTP servers

The FBI warns that attackers are targeting vulnerable FTP servers used by small medical and dental offices as a way to obtain medical records and other personal information.

Malware infection rate of smartphones is soaring – Android devices often the target

Malware infection rate of smartphones is soaring – Android devices often the target

Smartphones are by far the most popular target of mobile malware, and the infection rate is soaring, according to new research by Nokia.

 Consultant urges never pay ransomware demands

Consultant urges never pay ransomware demands

When ransomware criminals lock up files and demand payment to decrypt them, don’t pay but be prepared with backup.

Blockchain can help secure medical devices, improve patient privacy

Blockchain can help secure medical devices, improve patient privacy

If implemented properly, blockchain can help secure medical devices and improve patient privacy, but the key is proper implementation, according to a top security pro at Partners Healthcare.

Double Agent attack can turn antivirus into malware

Double Agent attack can turn antivirus into malware

An attack discovered by Cybellum called Double Agent can take over antivirus software on Windows machines and turn it into malware that encrypts files for ransom, exfiltrates data or formats the hard drives.

Ask.com serves as a conduit for malware - again

Ask.com serves as a conduit for malware - again

Businesses that allow the Ask.com toolbar in their environments might want to rethink that after endpoints equipped with the browser add-on were compromised last November and then again the very next month using pretty much the same...

Pwnie Express eases security remediation with a risk-assessment tool

Pwnie Express eases security remediation with a risk-assessment tool

Pwnie Express is adding a tool called Device Risk Scorecard to its Pulse Serivce that ranks the risks its security service finds on customer networks and makes it easier to remediate them.

Thieves steal Petya ransomware then use it for free

Thieves steal Petya ransomware then use it for free

Crooks are stealing code from the purveyors of Petya ransomware and using it to extort money from innocent victims, stiffing the creators of the malware out of the cut they are supposed to get.

Darktrace finds more attacks, cuts response time, saves money for Blackhawk Network

Darktrace finds more attacks, cuts response time, saves money for Blackhawk Network

Blackhawk Network gets better visibility into threats with Darktrace Enterprise Immune System, more productivity out of its security analysts and saves money by getting rid of multiple other security platforms.

Wikileaks’ dump of CIA exploits exposes enterprises to new risks

Wikileaks’ dump of CIA exploits exposes enterprises to new risks

Corporations concerned about the release of thousands of CIA documents detailing hacks against Apple iOS and Mac OSX, Google’s Android, Microsoft’s Windows, Linux and Solaris need to conduct a fresh round of risk assessment that takes...

Palo Alto Networks pays $105M for LightCyber to better detect network attacks

Palo Alto Networks pays $105M for LightCyber to better detect network attacks

Palo Alto Networks has bought LightCyber for its behavioral analytics platform that can speed the time to detect intrusions that have already breached networks and are moving around looking for ways to carry out exploits.

Trend Micro report: Ransomware booming

Trend Micro report: Ransomware booming

The profitability of ransomware made it the top cyber threat last year in two categories: the number of attacks and the amount of money generated for crooks, according to a Trend Micro lookback on data it collected from its customers....

Replace SHA-1. It’s not that hard.

Replace SHA-1. It’s not that hard.

Now that SHA-1 has been broken it’s time for enterprises that have ignored its potential weakness for years to finally act, and it’s not that hard.

Load More