Profile

Cover photo
Paul Roberts
Works at The Security Ledger
Attended Vassar College
Lives in Belmont, Massaschusetts
530 followers|95,964 views
AboutPostsPhotosYouTube+1's

Stream

Paul Roberts

Shared publicly  - 
 
As more firms face pressure to unmask hackers, the stakes get higher and innocent lives are put at risk.
1
Add a comment...

Paul Roberts

Shared publicly  - 
 
The Electronic Frontier Foundation warned that it has evidence of man-in-the-middle attacks that take advantage of the same encryption-busting technology that
1
Add a comment...

Paul Roberts

Shared publicly  - 
 
    Verizon says IoT adoption by businesses is taking off - but that increased risks are part of the bargain. In-brief: A report by Verizon
1
Add a comment...

Paul Roberts

Shared publicly  - 
 
Even with a high-profile summit in the heart of Silicon Valley, partisan gridlock back in Washington D.C. will make progress on cyber security impossible.
1
Add a comment...

Paul Roberts

Shared publicly  - 
 
IoT will make "datakinesis" - the impact of data attacks on the physical world - common, says Cisco's Marc Blackmer. Often I am asked how real I think the
1
Add a comment...

Paul Roberts

Shared publicly  - 
 
The New York Times reports on a massive online heist involving more than 100 banks worldwide and losses of between $300 million and $1 billion, according to the
1
Add a comment...
Have him in circles
530 people
Suzanne Moran's profile photo
Richard Dinjian's profile photo
Pinkerton's profile photo
Lloyd Day's profile photo
Tuomo Makkonen's profile photo
Poupart Raphael's profile photo
Adam O'Donnell's profile photo
Quadsys Limited's profile photo
Fred Destin's profile photo

Paul Roberts

Shared publicly  - 
 
A nice piece from Cisco's Scott Harrell on the SME sophistication gap in responding to advanced threats. 
In-brief: Cisco Vice President Scott Harrell says that small and mid sized organizations are in the crosshairs of sophisticated cyber criminals. Unfortunately,
1
Add a comment...

Paul Roberts

Shared publicly  - 
 
Cory Doctorow argues that remote "wipe" features take technology owners' autonomy away in the name of preventing muggings and other crimes.
1
Add a comment...
 
Is this SSL's final - final straw? 
Outrage over Lenovo's promotion of privacy busting adware continued to grow amid lawsuits and more spying revelations. The big question: is this the final -
1
Add a comment...
 
 
Security Ledger editor in chief Paul Roberts chats with Lance James, Head of Cyber Intelligence at Deloitte about fighting advanced threats, destructive hacks, incident response and the state of information security. 
This Hangout On Air is hosted by The Security Ledger. The live video broadcast will begin soon.
Q&A
Preview
Live
Conversation with Lance James of Deloitte
Thu, February 19, 1:00 PM
Hangouts On Air - Broadcast for free

View original post
1
Add a comment...

Paul Roberts

Shared publicly  - 
 
A growing number of tech firms offer online privacy tools at a price. They are giving privacy-conscious consumers new ways of avoiding tracking on the Web with self-destructing e-mails and temporary online identities.
1
Add a comment...
People
Have him in circles
530 people
Suzanne Moran's profile photo
Richard Dinjian's profile photo
Pinkerton's profile photo
Lloyd Day's profile photo
Tuomo Makkonen's profile photo
Poupart Raphael's profile photo
Adam O'Donnell's profile photo
Quadsys Limited's profile photo
Fred Destin's profile photo
Work
Occupation
Writer, Editor
Employment
  • The Security Ledger
    Editor in Chief, 2012 - present
  • Kaspersky Lab
    Editor, Threatpost.com, 2010 - 2012
  • 451 Group
    Senior Analyst, Enterprise Security, 2007 - 2010
  • Infoworld
    Editor, 2006 - 2007
  • Ziff Davis
    Senior Writer, 2005 - 2006
  • IDG
    U.S. Correspondent, IDG News Service, 2002 - 2005
  • Cisco Systems, Inc.
    Technical Writer, 2000 - 2002
  • SteelPoint Technologies
    Marketing and Communications Manager, 1996 - 2000
  • Logica PLC
    Technical Writer, 1994 - 1996
Places
Map of the places this user has livedMap of the places this user has livedMap of the places this user has lived
Currently
Belmont, Massaschusetts
Previously
Boston
Story
Tagline
security blogger | runner | dad
Introduction
I'm a 40-something living in the suburbs of Boston with my wife, three daughters and a mortgage. I'm Editor in Chief of The Security Ledger, a news blog that covers computer security and privacy, hacking and malware. In past lives, I've worked as a technology analyst and a reporter for a variety of publications including Threatpost.com, The 451 Group, Ziff Davis's eWeek, InfoWorld and the IDG News Service. My work has appeared in the Boston Globe, Salon.com, Forbes Small Business and elsewhere. I was, yes, a guest on The Oprah Show...but it's a long story.
Education
  • Vassar College
  • University of Utah
Basic Information
Gender
Male
Paul Roberts's +1's are the things they like, agree with, or want to recommend.
Cyber insurance: Only fools rush in | ITworld
www.itworld.com

Experts say that the cyber insurance market is still young and, when it comes to insuring against cyber attacks, do your homework

Liquid computing: The next wave of the mobile experience
www.infoworld.com

The traditional enterprise workflow is ripe for huge change as the focus moves away from working in a single context on a single device to t

Is It Time For Customs To Inspect Software? | Veracode Blog
blog.veracode.com

The Zombie Zero malware proves that sophisticated attackers are targeting the supply chain. Is it time to think about inspecting imported ha

Truth, Fiction and a 20 Year Old Vulnerability | Veracode Blog
blog.veracode.com

What were you doing in 1996? You remember '96, right? Jerry McGuire, Independence Day and Fargo were in the theaters. Everybody was dancing

Heartbleed Still Causing Heartburn on Industrial Systems | Veracode Blog
blog.veracode.com

An advisory from DHS's ICS CERT makes clear that ICS vendors are making progress toward fixing Heartbleed, but that customers face a long sl

AppSec Makes A Cameo In Obamacare Drama | Veracode Blog
blog.veracode.com

Warnings about death panels have proven to be overheated. Now the law's critics in Congress are demanding code audits for Healthcare.gov. Gu

Time to Crowdfund Open Source Security? | Application Security News, Res...
blog.veracode.com

Will crowd funding bug bounties for OpenSSL solve its security problems? Probably not. crowfund-openssl-bug-bounty. For years, security expe

Heartbleed And The Curse Of Third-Party Code | Application Security News...
blog.veracode.com

The recently disclosed vulnerability in OpenSSL pokes a number of enterprise pain points. Chief among them: the proliferation of vulnerable,

CERF: Classified NSA Work Mucked Up Security For Early TCP/IP | Applicat...
blog.veracode.com

Internet pioneer Vint Cerf says that he had access to cutting edge cryptographic technology in the mid 1970s that could have made TCP/IP mor

Hell is Other Contexts: How Wearables Will Transform Application Develop...
blog.veracode.com

Wearable technology is in its infancy. But don't be fooled: the advent of wearables will fundamentally change the job of the application dev

Five Product Security Questions Nobody At CES Wants You To Ask
www.veracode.com

The annual Consumer Electronics Show kicks off in Las Vegas this week. With rivers of ink spilled on cool, new “smart” products, here are fi

AllSeen Alliance
plus.google.com

Enabling the Internet of Everything

Google Unveils Toolkit To Stop Online Oppression
www.itworld.com

Google said on Monday that a suite of new services will help political activists, small businesses and non-profits defend themselves against

Breaking Bad(ware): Micro-targeting hits the spam world
www.itworld.com

A new spam run targeting fans of the cult show Breaking Bad proves that for spammers (and other business folk) we are the sum of the niche g

7 ways to beat fingerprint biometrics
www.itworld.com

Apple's embrace of finger scanning technology in the iPhone could be a breakthrough moment for biometrics. But finger scanners are no panace

DIY security: Cool tools you can build yourself
www.itworld.com

DIY electronics is entering a golden age with the help of powerful, cheap, programmable devices like the Arduino micro controller and Raspbe

Secure Email Is Dead
www.itworld.com

Recent revelations about wide ranging and warrantless government surveillance don’t mean that e-mail is dead – just that you can’t ever trus

IPMI: The most dangerous protocol you've never heard of
www.itworld.com

Another week, another terrifying presentation about security holes in IPMI – a widely used technology for remote management of servers. But

Next up: The Jamming wars
www.itworld.com

Personal privacy is going to turn from a "right" to a "fight" in the next decade, as individuals take up (digital) arms against government-

Black Hat 2013: Rise of the (Smart) Machines
www.itworld.com

Don’t let all the light and heat over the NSA’s PRISM program fool you. The big story at this year’s annual Black Hat and DEFCON conferences