- Hackers try to blackmail plastic surgeon after stealing 500,000 patient records
- Michaels says breach at its stores affected nearly 3M payment cards
- DDoS Attackers Change Techniques To Wallop Sites
- IT security is national security -- but you're not alone
- Federal CIOs Moving Cybersecurity Beyond Compliance
Amazon's ambitious plan to use flying drones to deliver packages is far-fetched, but not just because of technology limitations or air traffic regulations. Amazon's fulfillment center network, as it stands now, is too limited to serve even a tiny fraction of the U.S. in the method described by CEO Jeff Bezos.
Amazon Web Services this week rolled out a new cloud-based data analytics tool named Kenesis, which can analyze massive amounts of data in real time and be paid for by the hour.
Some of the most memorable IT-related quotes were uttered in courtrooms this year, which involved a steady stream of legal challenges about intellectual property. In no particular order, these are some of the comments that stuck with us as 2012 winds to a close.
It wouldn't be a mischaracterization to equate the cloud computing industry to the wild, wild west.
If the iPad doesn't succeed as a consumer electronics device--its initial target market--it may find a successful second career as an electronic textbook reader.
Amazon's extending its electronic bookstore onto your desktop. The company announced plans for a Kindle for PC desktop application at Microsoft's Windows 7 launch event Thursday.
There's been a lot of discussion the past couple of days about an analysis by Guy Rosen, in which he estimates that Amazon Web Services (AWS) is provisioning 50K EC2 server instances per day. He created this estimate by examining EC2 resource IDs and doing a time-series analysis on how much the IDs are incremented per hour.
E-books may have been a niche technology so far, but Google Inc.'s entry into the market could burst the online business wide open.
This paper serves security professionals interested in better techniques for finding vulnerabilities, who have a solid understanding of networking principles and familiarity with the concepts related to hacking, vulnerabilities, and exploits. Read on for an in-depth view of the use of expert systems to achieve accurate and detailed vulnerability results.
Why do we continue to pay the earth for global roaming? With Telstra increasing global roaming charges by 100-500% in over 180 countries, bill shock can only get worse. This paper investigates why, what and how your company can address the need for global coverage.
- In pictures: Customer 360 Symposium hits the Hunter Valley
- Why CMOs must embrace the seven principles of agile marketing
- Google opens the floodgates for new 'social' ads
- Telefónica starts exchange for targeted mobile ads
- Crowdsource guide ranks marketing automation platforms by user recommendations and company size