Feeds

Apple reneges on Black Hat security talk

Marketing drones demand Jobsian secrecy

SANS - Survey on application security programs

Black Hat Apple's politburo has put the kibosh on a presentation scheduled for the Black Hat security conference that was to give an inside look at the ultra-secretive company's security response team.

Black Hat officials had already given the Apple team the go-ahead when people inside Apple's marketing department vetoed the talk, which would have been the first time Apple has discussed its security practices. "Marketing got wind of it, and nobody at Apple is ever allowed to speak publicly about anything without marketing approval," a Black Hat organizer told IDG News.

Apple's policy of saying next to nothing about how it goes about protecting its users from escalating threats is, to say the least, unfortunate. Just last week, the company said it had patched its software from a serious flaw in the net's address lookup system. Three days after two separate researchers warned Mac clients are still vulnerable to the flaw, Apple hasn't uttered a word, an omission that generates confusion and doubt in those who depend on the vendor. Apple's tight-lipped policy contrasts sharply with practices at other companies such as Microsoft.

It isn't the first Apple talk to be pulled from consideration at Black Hat. Security researcher Charles Edge pulled his talk about a previously undisclosed weakness in Apple's File Vault encryption system out of concerns it might run afoul of confidentiality agreements he signed with Apple. A Black Hat representative said Edge had submitted a proposal to speak on the topic, but that it was pulled before officials ever accepted it. ®

3 Big data security analytics techniques

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Kingston DataTraveler MicroDuo: Turn your phone into a 72GB beast
USB-usiness in the front, micro-USB party in the back
IBM rides nightmarish hardware landscape on OpenPOWER Consortium raft
Google mulls 'third-generation of warehouse-scale computing' on Big Blue's open chips
It's GOOD to get RAIN on your upgrade parade: Crucial M550 1TB SSD
Performance tweaks and power savings – what's not to like?
AMD's 'Seattle' 64-bit ARM server chips now sampling, set to launch in late 2014
But they won't appear in SeaMicro Fabric Compute Systems anytime soon
Microsoft's Nadella: SQL Server 2014 means we're all about data
Adds new big data tools in quest for 'ambient intelligence'
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.