Security Job #1 For Feds
The 2014 InformationWeek Government IT Priorities Survey shows federal IT pros care about security - itís rated as very important by 69% of respondents, 30 percentage points ahead of the No. 2 priority, disaster recovery. Will the upcoming NIST cyber-security framework help manage risk?
Bitcoin Heists Cause More Trouble
Attackers continue to pummel bitcoin "banks," exchanges, and crypto-currency users themselves via malware that steals virtual wallets.
Big Data Meets Threat Detection
Security practitioners are getting a lot smarter about using security analytics and big data to identify threats in real-time. But there's a still a lot to learn.
Wearables At Work: Hello Big Brother?
Employers must tread carefully with activity trackers and devices like Google Glass. Wearables could take real-time personal data collection to unnerving new heights.
9 Worst Cloud Security Threats
Leading cloud security group lists the "Notorious Nine" top threats to cloud computing in 2013; most are already known but defy 100% solution.
NSA Scandal Darkens Cloud Discussions At RSA
From Europe's efforts to create regulations for data localization to worries over the security of the cloud, the leaks of the past eight months have cast a shadow over cloud providers.
Apple SSL Vulnerability: 6 Facts
SSL vulnerability that's been patched in iOS -- but not yet for OS X -- lets attackers intercept email and FaceTime communications, plus push malicious software updates.
How I Secure My Personal Cloud
As global cloud traffic grows exponentially, IT pros face the daunting task of securing their personal cloud, data, and workloads.
LinkedIn Privacy: 5 Safety Tips
Protect your LinkedIn account by browsing securely, keeping your activity private, and recognizing signs of malicious behavior.
TSA Baggage Scanners Hackable
Researchers reveal weak security that could allow malicious insiders or attackers to spoof the contents of carry-on baggage.
Mask Spyware Outdoes Flame
Rare Spanish-speaking cyberespionage campaign uses spyware and malware tools that researchers call the most sophisticated yet.