Will your Swiss email account stay private (or can the govt take a look)?
A referendum is to be held on Switzerland's proposed surveillance law, a decision lauded by supporters of privacy. ESET's Cameron Camp discusses further.
Education: CISSP, RHCSA
Highlights of your career? Reverse engineering human brain patterns.
What malware do you hate the most? Nation state sponsored low and slow.
Favorite activities? Building and flying airplanes.
What is your golden rule for cyberspace? Stupid hurts.
When did you get your first computer and what kind was it? 1988, Radio Shack TRS-80.
Favorite computer game/activity? Java/Big Data algorithms to find brain patterns.
A referendum is to be held on Switzerland's proposed surveillance law, a decision lauded by supporters of privacy. ESET's Cameron Camp discusses further.
Cameron CampThe final instalment in Cameron Camp's security-focused coverage of CES 2016, looks at the future of drones. It's all about augmented reality.
Cameron CampCar security is rising to the fore here at CES 2016, which is not altogether surprising as 2015 was the year when car hacking really crossed over into the mainstream.
Cameron CampAs ever, ESET is once again in attendance at CES in Las Vegas, offering you expert insight into all the security aspects of this year’s show, which, from what have seen so far, is a key focus for CES in 2016.
Cameron CampIf many endpoints’ traffic pass through the VM host, why not move security there, sort of catch “bad things” before they even enter the endpoint, asks ESET's Cameron Camp.
Cameron CampVirtualization aims to totally change how we think of IT altogether. Against the backdrop of VMworld, we take a closer look at the key details.
Cameron CampIf you have a ton of VMs sprawling the globe, how do you make them all fast? That’s the subject floating around the show floor at VMworld in SFO this year.
Cameron CampThis year VMworld tackles what happens when your VM farm grows up and spawns hundreds or thousands of baby VMs
Cameron CampIf Black Hat is becoming the new RSA, then DEF CON is oozing toward Black Hat, it seems, and B-Sides is the new DEF CON. This year it got some Ikea furniture to spruce up its mom’s basement. Not totally commercial, but definitely more – first apartment folding furniture – chic; the basement just got upgraded.
Cameron CampThis year at Black Hat, the focus was as much on hacking the intersections of data as on a specific computer platform.
Cameron CampBlackhat grew! Not only did the hacker types leave their mom’s basement and get jobs, some even were forced to start explaining security to the CEO. A few succeeded in this new role, but enough to convince the execs that if something bad happens in IT, it happens to the execs shortly thereafter.
Cameron CampWant to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences.
Cameron CampIn this recorded webinar the security challenge that mobile devices and BYOD bring to the businesses, notably smaller businesses, is reviewed; then defensive strategies are presented.
Cameron CampReporting from Interop 2015, Las Vegas, where it's all about the connectivity and the massive leaps forward in network capacity and speed, but security concerns are also in the mix.
Cameron CampWhat were the major themes from the RSA 2015 conference? Cameron Camp is on hand to give his verdict...
Cameron CampAfter the Anthem mega-breach, questions abound about possible abuses of medical data. Here is a breakdown that offers some context.
Cameron CampContinuing from Consumer Electronics Show 2015 here in Las Vegas where we were covering this week the first impresisions of the show and also some lessons that this digital invasion is leaving us. Now, we will approach another interesting topic that involves privacy and new technology: drones.
Cameron CampEver lost a kid somewhere? Not anymore if the gadget vendors have anything to say about it. Now you can digitally strap your kid to your tablet and keep track of them. Kids not running enough to stay trim? There’s an app for that that works the same way. Got high blood sugar? You can keep track of that too using the sensor-du-jour highlighted at CES 2015 in Las Vegas.
Cameron CampWith nearly 160,000 lust-ridden techies, corporate denizens and a few of us security types descending on a slightly crisp wintery Las Vegas to see what all the fuss is about at CES 2015, here are a few things to keep an eye out for this year at the show.
Cameron CampSecurity of open source code is a hot topic, what with Heartbleed, Shellshock, and Poodle making the news. Open source code is now widely used everywhere, from big enterprises to small businesses. This recorded webinar discusses how to keep open source tools secure,
Cameron CampFollowing the ground up overhaul of the BlackBerry operating system and accompanying launch of their new flagship smartphones last year, we wondered how they really stack up–security wise–against the other smartphones you might already have in your pocket or purse right now. How do new devices running Blackberry 10–as the new OS is called–compare to
Cameron CampWith malicious remote access attacks of the rise it is time to check your computer's RDP configuration and apply restrictions, like turning it off, limiting users, and applying strong passwords
Cameron CampThe Android ecosystem has taken the market by storm in the last few years, with hundreds of millions of devices, smartphones and tablets, already in the hands of customers, and more on the way this holiday season. As you will know if you read our recent blog post about malware trends in 2013, malicious code
Cameron CampOn the heels of the arrest of Cory Kretsinger, aka “Recursion”, for one of the Sony data breaches, following an FBI request for traffic records from his VPN provider, users wonder whether anonymizing service providers really are all that anonymous. Using a VPN to connect securely out of reach of prying eyes, is a common
Cameron Camp