IoT Security: Industry Finally Waking Up To The Dangers
For the last several years, Internet of Things security has been one of the most hotly debated topics at Mobile World Congress. This year, however, IoT security took on a new sense of urgency as more devices are being connected and the technology turns mainstream.
HPE Fortifies Security For Mobile And Enterprise
HPE Security is looking to improve the security of mobile devices and the enterprise overall with two new security offerings announced in conjunction with the RSA Conference. HPE also released its Cyber Risk Report 2016.
Apple Preparing Enhanced iPhone Security, NYT Reports
The struggle between Apple, the FBI and the US Justice Department speaks to a need for critical discussions about the ramifications and rules in a changing world. The New York Times reports Apple is looking to make it even harder to crack the iPhone's security, while CEO Tim Cook continues to defend his company.
iPhone Encryption: 5 Ways It's Changed Over Time
Apple's battle with the FBI has put iPhone encryption in the spotlight. However, some might be surprised that the company's encryption efforts have evolved slowly and are not that different from those of other smartphone makers. Here's a look at the 5 phases of the process so far.
Security Concerns Continue Amid Cloud Adoption
While most top IT executives at companies of all sizes continue to express concern about the security of data in the cloud, that hasn't slowed their move to embrace this new infrastructure as a home for corporate data. A new survey and report reveal their top security nightmares and provides some recommendations about how to protect data in the cloud.
Apple Fights FBI Over Disabling Security In San Bernadino Case
The FBI wants Apple to help it crack the passcode of an iPhone owned by one of the shooters in the December San Bernardino attack that killed 14 people. But CEO Tim Cook says this demand would "undermine the very freedoms and liberty our government is meant to protect."
Rise And Fall Of The Chief Data Officer
The C suite is expanding with more roles dedicated to data and analytics. The Chief Data Officer, or CDO, is one of these roles seen more often in some industries than others. The position may evolve with time. We explain some of the dynamics that cause CDOs to succeed and fail.
8 Ways To Secure Data During US-EU Privacy Fight
After months of legal uncertainty over transatlantic data flows, the European Commission and the US have agreed on a new framework called the EU-US Privacy Shield. But because no text is available yet, there's no way to interpret it. Here's what organizations need to know now.
Facebook Faces Trouble In France For Tracking Non-Users
The CNIL, France's data regulation authority, has issued a formal notice to Facebook, warning the social network that it needs to fairly collect data concerning the browsing activity of Internet users who do not have an account.
BIOS Hack Detection Added To Dell Enterprise Security Suite
With millions of machines potentially vulnerable to attacks on their BIOS firmware, Dell has introduced a verification tool designed for enterprise IT to monitor users' machines and intervene if an attack is detected. The cloud-based tool takes a different approach than other BIOS offerings on the market.
US Education CIO Admits To 'Unacceptable' Behavior
US Department of Education CIO Danny Harris was grilled by lawmakers about possible ethics violations. Meanwhile the department, which has a lending budget the size of Citibank, was still said to be vulnerable to security threats.
OPM Breach Leads To New Systems, Procedures
The Obama Administration announced changes to the Office of Personnel Management designed to ameliorate the flawed systems and processes that led to a massive data breach in late 2014. The plans -- and the steps taken to get there -- hold lessons for any IT organization.
65% Say Cloud As Secure As On-Premises
Nearly two-thirds of IT security professionals think cloud software security equals what they can provide in enterprise data centers, according to Cloud Security Alliance survey.
IoT Shows Its Worth To Businesses
The Internet of Things (IoT) can be used for a diverse set of tasks, including opening up new business models. A recent Forrester report explores how businesses are embracing IoT.
Encryption Vs. Privacy Battles Rage From Davos To US
The debate over efforts to protect users' privacy and encryption versus governments' efforts to fight terrorism was a major focus at the World Economic Forum in Davos this week. Meanwhile, battles over the same issue are emerging in the US from New York to California on the legislative level.
Government IT: Hot Tech Trends In 2016
Local, state, and federal governments are aiming to make their tech initiatives more open, responsive, technically up-to-date, and secure this year. Can they pull it off?
Top Data Privacy Issues To Scare You In 2016
In 2016 issues regarding privacy, whether in personal or business data, are going to dominate headlines and change the way people interact with technology and the companies that provide it. From encryption to drones, to personal information, here's what to watch in the next 12 months.
Encryption Debate: 8 Things CIOs Should Know
Governments want access to encrypted communications to prevent terrorist attacks, but IT professionals and tech vendors say any weakening of encryption is a threat to privacy and data security.
Top Priorities For State CIOs: 2016
State government CIOs face many of the same challenges that private sector IT executives do, such as updating systems for a digital world, securing those systems, and leveraging big data. Here are their top 10 priorities, according to NASCIO's annual membership poll.
Yahoo Now Alerting Users Of State-Sponsored Hacks
Yahoo will begin warning its users when the company suspects that customers' accounts have been targeted by state-sponsored hackers. Twitter and Facebook have already started similar alert systems.
Apple Blasts UK 'Snooping' Bill
In keeping with Tim Cook's professed desire to keep customer information private, Apple objected to a new UK bill that would expand the government's ability to snoop into citizens' messages and Internet use.
Spy Agencies Fund IBM's Quantum Computing Research
Big Blue gets a multi-year grant from the US intelligence community for the development of quantum computing technology. A universal quantum computer could tackle challenges such as safeguarding against cyberattacks and speeding up medical R&D.
Cyberwar Part 3: Marketing Data Collection Threatens All
Marketers are after every scrap of customer data they can get, in hopes of increasing their company's sales. Do you know they may be putting you at risk in the process? In the last of our three-part series on cyberwar, learn what IT needs to know about potential security threats rising from companies' marketing habits.
Cyberwar Part 2: Government Hacks Threaten Private Sector
When you hear the term cyberwar, you think about threats to government, but private sector companies are also at risk. In the second of our three-part series on cyberwarfare, we identify three vulnerabilities and offer IT leaders suggestions on what to do about them.