- As IAM demand builds, tight identity integration will secure enterprises’ cloud transition: Okta
- Re-used crypto keys expose millions of devices to attack
- Microsoft beefs up security products to block adware
- Dridex spam campaigns target the US, UK and France
- Lenovo patches serious vulnerabilities in PC system update tool
cyberwarfare - News, Features, and Slideshows
Any effort to rein in the National Security Agency after its widespread spy activities were revealed in leaked documents must focus on more than simply limiting what personal data can be collected.
The remarkable success that Chinese state-sponsored groups have had in infiltrating U.S. government, military and corporate networks in recent years should not be mistaken as a sign of growing technical superiority over the U.S. in cyberspace, security experts said.
Applying Big Data approaches to information security can help enterprises build better situational awareness capabilities, but implementation could prove to be a major challenge, security experts said at the RSA Conference 2013 being held here this week.
China is by far the most aggressive, but not the only, country attempting the sort of extensive cyberespionage described in security firm Mandiant's dramatic report, released this week.
More DDoS attacks on banks, cyberwarfare, and targeted attacks could well be in store in 2013, security experts warn.
If you are making a list of tech predictions for next year, as this story does, it may be a good idea to put the solar maximum on this list. The next one is expected in 2013, says NASA.
- Getting email marketing back on track: Identity Direct's story
- CMO’s top 10 martech stories this week
- How content, personalisation and product fit into REA Group's new marketing strategy
- AANA and IAB Australia launch new native advertising best practice guidelines
- Report reveals advertising viewability in Australia lower than any other country