John Casaretto

SiliconANGLE's CyberSecurity Editor - Have a story tip or feedback? Please reach out to me! Security is as critical as ever and our mission is to uncover those stories that will help our industry be more secure.

Latest from John Casaretto

Tendril – Disrupting the energy business with data

The energy business model has been simple for a long time – produce more energy, then sell more energy. Tendril is aiming to change that with the powerful combination of data and product marketing.  The Boulder, Colorado company is using data to improve online customer experiences and leverage information about customer behavior.  The platform is ...

From good to great : Good Technology IPO signals new direction

Mobile security solutions provider Good Technology has filed for an initial public offering (IPO).  The public filing with the Securities and Exchange Commission (SEC) comes after a year of speculation that the Sunnyvale, CA company would enter the public arena. Good Technology’s platform is an industry provider of mobile device security and mobile device management. ...

Target CEO leaves behind a mixed security legacy

There may be a little-considered aspect to former Target CEO Gregg Steinhafel’s mixed security legacy.  In the wake of Steinhafel’s resignation last week as the company’s president, CEO and Chairman of the Board, one cause that has been singled out in the eyes of many is the massive data breach that the company endured under his ...

Full speed security evolution with FireEye acquisition of nPulse

Network security company FireEye announced this week that they have added the security forensics company nPulse in a $60 million acquisition.  The move is an escalation of enterprise datacenter capabilities for the security giant, and follows the noteworthy $1 Billion acquisition of Mandiant, the security intelligence group that famously disclosed a Chinese state-sponsored military cyber ...

IBM launches zero-day security, threat and data protection program

On the heels of its successful #IBMImpact event last week, IBM today unveiled a new line of enterprise services aimed at zero-day attacks and protecting critical data.  Dubbed the IBM Threat Protection System and Critical Data Protection Program, it is the result of two years of significant investment in organic development and the acquisition of ...

The design behind Chadder, John McAfee’s new chat app for security-conscious millennials

Many are weary of hearing about online safety because of the potential permanence for things they post on social sites, through email and on the web.  This is especially the case when it comes to mobile apps and social platforms because of a variety of security and privacy loopholes.  An interesting new application has been ...

FBI: Healthcare is stuck in 2004, susceptible to cyberattacks

In a warning to the industry, an FBI cybersecurity report has put healthcare providers on notice.  Details first circulated by Reuters state that the healthcare industry is a decade behind the financial services sector on the cyber security front.  At risk is a significant target comprised of the insurance data and personal medical records of ...

HP Security researchers develop IE vulnerability filters

HP’s Security division is constantly publishing developments on breaking vulnerabilities.  As evidence of these efforts and prompt response, HP’s firewall technology brand TippingPoint has developed and published the details of a pair of filters using its technology to protect against the major Internet Explorer vulnerability that emerged over this past weekend.  The rapid development and deployment of ...

Target retools tech + execs : Highlights of improved credit card security

Target is a retail behemoth well-rooted in the Minneapolis area as one of the biggest IT employers for the region.  As Target continues its efforts to rebound from the massive retail security breach late last year, it has made a couple of key announcements towards these goals.  These appear to be significant movements in the ...

Facebook denies reward for DDoS exploit : Trouble still lurking?

In practice, there are many ‘better’ ways to execute a Distributed Denial of Service (DDoS) attack, however one programmer has uncovered a flaw in the ‘Notes’ feature within the social network site Facebook that could put such an attack tool into the hands of millions. In a blog post over the weekend, Chaman Thapa described ...