Profile

paulfroberts
Member since: August 2012
Bio:
I'm an experienced writer with a decade of work as a reporter and industry analyst covering IT security, cyber security and hacking. Prior to donning the reporter's cap, I spent close to a decade in the technology field, providing technical communications, product training and marketing and communications services to firms including Cisco Systems, Logica and SteelPoint Technologies (now part of Autonomy Corp. PLC).
More recently, I served as editor of the computer security blog Threatpost.com. My writing has appeared in The Boston Globe, Salon.com, Fortune Small Business, as well as ZDNet, Computerworld, InfoWorld, eWeek, CIO , CSO , ITworld as well as long format analysis for The 451 Group. I have provided expert commentary on cyber security and emerging threats for leading news outlets including NPR's Marketplace TechReport. Finally 'yes,' I was a guest on The Oprah Show — but it’s a long story.
Areas of Interest:
Activity
-
paulfroberts wrote Security stories to watch: Security firm Bit9 hacked. Also: Microsoft megapatch and identity management The hack of security firm Bit9 reminds us that application whitelists work great at stopping malware ... until they don't. And: Microsoft prepares a mystery 'double patch' of the Internet Explorer web browser, fueling speculation.34 weeks 4 hours ago
-
Last week's revelations about hacks of prominent media outlets continues. Plus: new questions about the security of encrypted communications will dominate the news this week.
35 weeks 7 hours ago
-
D.C. wonks warm up to a new Cold War: this one fought with computers. Plus: Death of Aaron Swartz inspires Anonymous back to action.
36 weeks 7 hours ago
-
Plan on hearing a lot more about the world's most famous (and audacious) Internet tycoon: Kim Dotcom this week, following the launch of his new cloud-based storage service: Mega. And: more stories about the computer security threat posed by things you didn't even know were computers.
37 weeks 7 hours ago
-
Forget "PC LOAD LETTER," a vulnerability in a standard component of modern office printers may make hardware from a wide range of vendors vulnerable to denial of service attacks and data theft, according to a researcher for security firm ViaForensics.
37 weeks 8 hours ago
-
The patches are out for both Java and Internet Explorer, but this is hardly the end of the story - or the hand wringing. Also: a SCADA-pocalypse!
37 weeks 6 days ago
-
There are a lot of reasons to be skeptical of a future in which smart devices of every shape and size do our thinking for us. Here are five good reasons the Internet of Things might just make our lives worse.
38 weeks 6 hours ago
-
Privacy regulations like HIPAA and GLB are mind boggling in their complexity, and that makes complying with them difficult. But what if you could automate compliance audits, harnessing heavy compute power to measure compliance with privacy laws and spot violations? Researchers from CMU may have found a way to do so.
38 weeks 3 days ago
-
paulfroberts wrote 3 security things to watch: A Turkish twist, IE's quick fix, Anonymous takes action in high school assault case Look for continued fallout from the security lapse at Turkish Certificate Authority TurkTrust this week in security. Also: pressure on Microsoft over IE flaw, and hacktivists take action in high profile high school rape case.39 weeks 5 hours ago
-
For much of the past quarter century, computer crime has been a decidedly First World problem. But that's about to change, security experts say.
40 weeks 4 days ago
-
A new week is upon us and, with it, new challenges. Here are some of the big security stories to watch for in the coming days.
42 weeks 5 min ago
-
The onslaught of sophisticated cyber espionage against the U.S. and its allies has roused both lawmakers and private sector firms to tackle supply chain security.
43 weeks 5 hours ago
-
[chunklet] Would-be lovers - stop using e-mail to communicate.
45 weeks 6 days ago
-
Consider this scene: it's October, 2011. Security researchers gathered in Louisville, Kentucky for the annual DerbyCon security conference. On the schedule that year, alongside presentations on “Advanced Nmap Scripting” and “anti forensic techniques,” was a humble birthday party for, of all things, a software vulnerability.
47 weeks 4 days ago
-
[chunklet]
49 weeks 23 hours ago
-
Apple did little to enhance the iPhone's security bona fides with the release of iPhone 5. But that may not matter in the end, as Steve Jobs’ baby stands poised to supplant Blackberry as the go-to phone for enterprise users. Is that fair? You bet. And here's why ....
1 year 1 week ago
-
Corporations are people, and lax business filing systems mean that stealing their identities has never been easier. Now some states are starting to take action.
1 year 4 weeks ago
- ‹‹
- 2 of 2
Friends' Activity
Follow other ITworld members or sign in with your Facebook account in order to view your friends' activity.

















