Security » Features »

  • The Sony breach may be start of new nation-state cyberattack

    It has been an exceptional year for IT security breaches, which have become part of an escalating trend in destructive attacks. And they're going to get worse.

  • iWARP update advances RDMA over Ethernet for data center and cloud networks

    The challenge for data center operators selecting a high performance transport technology for their network is striking the ideal balance between acquisition, deployment and management costs, and support for high performance capabilities such as the remote direct memory access (RDMA) protocol.

  • Privacy is the new killer app

    A funny thing is happening in the wake of the Edward Snowden NSA revelations, the infamous iCloud hack of celebrity nude photos, and the hit parade of customer data breaches at Target, Home Depot and the U.S. Postal Service. If it's not the government looking at your data, it's bored, lonely teenagers from the Internet or credit card fraudsters.

  • Python-powered StackStorm sets scripts for event-triggered automation

    StackStorm, staffed by former members of GitHub, PuppetLabs, SwiftStack, Rackspace, and the Apache Libcloud team, has launched the first public version of its eponymous open source operations automation solution.

  • Why we live in an anti-tech age

    Though it seems as if we're sourrounded by innovative products, services and technologies, there's a growing counter argument that we're living in a dismal era. Science is hated. Real technological progress has stalled. And what we call innovation today really isn't very innovative.

  • Microsoft Security Essentials may be throwing false positives for Trojan:DOS/Alureon.J

    It's looking more and more likely that Microsoft Security Essentials (MSE) is warning about a Trojan:DOS/Alureon.J infection when none exists.

  • Blowing the whistle without blowing your career

    Technology professionals are among today's most infamous whistleblowers. The list of those who have made headlines for exposing corporate or government skulduggery includes Shawn Carpenter, a network security analyst who blew the lid off a Chinese cyberespionage ring; Bradley (now Chelsea) Manning, who shared more than 250,000 classified State Department cables with WikiLeaks; and Edward Snowden, who leaked top-secret information about NSA surveillance activities.

  • Sorriest technology companies of 2014

    It's so far been another sorry, sorry year in the technology industry, with big name companies, hot startups and individuals making public mea culpas for their assorted dumb, embarrassing and other regrettable actions.

  • A common theme in identity and access management failure: lack of Active Directory optimization

    From the vantage point of most people, even technical folks, Active Directory (AD) seems like it's doing pretty well. How often can you not log in when you sit down at your PC? How often do you fail to find someone in the corporate directory in Outlook? How many times have you heard of an AD outage?

  • Supervalu breach shows why move to smartcards is long overdue

    The data breach disclosed by Supervalu is another reminder about why the ongoing migration of the US payment system to smartcard technology can't happen fast enough.

  • 3D printing makes its move into production

    The use of 3D printing for finished goods is about to disrupt manufacturing and supply chains in a big way. Here's why, and here's how IT will be critical to that transition.

  • Where your personal data goes when you're not looking

    What businesses know about any given individual is a lot. But what are companies doing with that data? Not as much as you might think -- at least not yet. Companies are getting more sophisticated, however.

  • For half, STEM degrees lead to other jobs

    The truth, when it comes to computer employment data, is almost always ugly.

  • Boost your security training with gamification -- really!

    Getting employees to take security seriously can be a game that everyone wins.

  • Apple-IBM deal threatens Android's enterprise push

    The new Apple-IBM partnership seems sure to help Apple sell more iPads to businesses, but it may also be setting off alarm bells at mobile device management companies large and small.

  • Revamping your insider threat program

    Companies including MITRE are looking at privileged access and how to better lock it down -- without stopping employees from doing their jobs.

  • What vacation? Expect to work while you're away

    In these lean times, backups aren't what they used to be; it's inevitable that IT staffers will be called to help, especially when an important issue is brewing.

  • Google's move into home automation means even less privacy

    Plans by smart thermostat maker Nest Labs to share some customer data with corporate parent Google means the search engine giant will be fending off privacy concerns as it expands into home automation.

  • With Android L, Google makes pitch for enterprise users

    Google will provide enterprise-focused security and management features to its entire Android showcase of mobile devices, including features reserved only for Samsung devices running Samsung security software called Knox, a Google executive announced during the Google I/O keynote address Wednesday.

  • XPocalypse, not now

    Two months after Microsoft ended support for Windows XP, the catastrophic wave of exploits security experts expected to wash over the aged operating system have failed to materialize.

CIO
ARN
Techworld
CMO