- Data breaches can be traced back to nine attack 'patterns', says Verizon report
- SMS spam rises in UK as 'accident compensation' scammers get busy
- Verizon breach report makes case for behavioral analytics
- NSA spying revelations have tired out China's Huawei
- Coding error protects some Android apps from Heartbleed
- USB Type-C: Simpler, faster and more powerful
- Data retention: Just like diamonds, metadata is forever
- Should Australians prepare for rubber-hose cryptanalysis?
- Connected vehicle tech trial to start trucking on in NSW
- UPDATED: 4G in Australia: The state of the nation
The Obama Administration has secured a 90-day extension of the National Security Agency's controversial authority to collect phone metadata records on U.S. customers under the Patriot Act.
Microsoft is unbundling chunks of Office, including a rumored free OneNote client for the Mac, as part of a strategy to reach customers who can't stomach the idea of paying for the full-fledged suite, or who have opted for free or inexpensive alternatives, an analyst said today.
Sen. Dianne Feinstein's (D-Calif.) claim that the CIA violated provisions of the Computer Fraud and Abuse Act when it accessed computers used by members of the Senate Intelligence Committee, could be hard to substantiate, according to a leading legal expert.
The CIA's decision to use Amazon's cloud is part of a broader IT shake-up to make the spy business more efficient.
The inspector general of NASA has issued a report that's critical of both Hewlett-Packard and the space agency for messing up a plan to centralize management of the agency's end-user computing under a $2.5 billion outsourcing contract.
Ever since President Obama signed the Open Data Executive Order, government agencies have been making their vast data stores available to the public. These once-secret data sets are proving a valuable business resource, too.
A report Thursday by the Privacy and Civil Liberties Oversight Board calling the NSA's bulk phone records collection program illegal and mostly useless puts the Obama Administration in an awkward spot.
The NSA is spending some $80 million in basic research on quantum computing, money that may ultimately help commercialize quantum computing for the private sector.
CGI Federal, the lead contractor at Healthcare.gov, is a veritable black belt in software development, with the highest possible certification from CMMI. So what does the website's flawed rollout say about how useful CMMI is?
Some localities are shying away from predicting who will commit a crime, even though the technology exists, in favor of when and where.
While many who invest in Data Centre Infrastructure Management (DCIM) software benefit greatly, some do not. Research has revealed a number of pitfalls that end users should avoid when evaluating and implementing DCIM solutions. Choosing an inappropriate solution, relying on inadequate processes, and a lack of commitment / ownership / knowledge can each undermine a chosen toolset’s ability to deliver the value it was designed to provide. This paper describes these common pitfalls and provides practical guidance on how to avoid them.
Why do we continue to pay the earth for global roaming? With Telstra increasing global roaming charges by 100-500% in over 180 countries, bill shock can only get worse. This paper investigates why, what and how your company can address the need for global coverage.
- Google will push mobile app installs in search and YouTube
- Salesforce at 15: Industry disruptor wards off midlife crisis
- Branded comments and shares a growing part of the social engagement mix for marketers
- 8 things we learnt about big data analytics from the Adobe Summit
- AdRoll secures US$70 million to ramp up retargeting platform development