Heartbleed: Making The Case For SDN
Software-defined networking technology could help protect against vulnerabilities like Heartbleed. It's time to develop a more mature SDN option.
Office for iPad: Microsoft Shifts Strategy
After years of anticipation, Microsoft Office for iPad arrives -- and it's just the beginning of a new push toward apps across all mobile devices, says new CEO Satya Nadella.
Cybercrime Black Markets Grow Up
Cybercrime forums selling advanced attacks on demand are outpacing businesses' ability to defend themselves, new study from RAND finds.
Security Job #1 For Feds
The 2014 InformationWeek Government IT Priorities Survey shows federal IT pros care about security - itís rated as very important by 69% of respondents, 30 percentage points ahead of the No. 2 priority, disaster recovery. Will the upcoming NIST cyber-security framework help manage risk?
Big Data Meets Threat Detection
Security practitioners are getting a lot smarter about using security analytics and big data to identify threats in real-time. But there's a still a lot to learn.
Wearables At Work: Hello Big Brother?
Employers must tread carefully with activity trackers and devices like Google Glass. Wearables could take real-time personal data collection to unnerving new heights.
9 Worst Cloud Security Threats
Leading cloud security group lists the "Notorious Nine" top threats to cloud computing in 2013; most are already known but defy 100% solution.
NSA Scandal Darkens Cloud Discussions At RSA
From Europe's efforts to create regulations for data localization to worries over the security of the cloud, the leaks of the past eight months have cast a shadow over cloud providers.
LinkedIn Privacy: 5 Safety Tips
Protect your LinkedIn account by browsing securely, keeping your activity private, and recognizing signs of malicious behavior.
TSA Baggage Scanners Hackable
Researchers reveal weak security that could allow malicious insiders or attackers to spoof the contents of carry-on baggage.
Mask Spyware Outdoes Flame
Rare Spanish-speaking cyberespionage campaign uses spyware and malware tools that researchers call the most sophisticated yet.
Federal CIOs' Current Security Dilemma
Three initiatives meant to improve government IT security are languishing from funding challenges, yet CIOs are asked to deliver on the promise of shared services.
10 Famous Facebook Flops
Facebook has suffered some ignominious strikeouts during its 10 years. Consider these 10 features and products that didn't fly.