The Sony breach may be start of new nation-state cyberattack

It has been an exceptional year for IT security breaches, which have become part of an escalating trend in destructive attacks. And they're going to get worse.

By Patrick Thibodeau | 19 December, 2014 04:29

Tags: new york times, data security, security, data protection, sony, Sony Pictures

iWARP update advances RDMA over Ethernet for data center and cloud networks

The challenge for data center operators selecting a high performance transport technology for their network is striking the ideal balance between acquisition, deployment and management costs, and support for high performance capabilities such as the remote direct memory access (RDMA) protocol.

By Wael Noureddine, David Fair | 11 December, 2014 07:40

Tags: Internet Engineering Task Force, Ethernet, Ethernet Switch, IETF, Infiniband, IT management

Displaced IT workers are being silenced

A major problem with the H-1B debate is the absence of displaced IT workers in news media accounts. Much of the reporting is one-sided -- and there's a reason for this.

By Patrick Thibodeau | 05 December, 2014 09:29

Tags: new york times, services, The New York Times, outsourcing, Facebook, IT outsourcing

Privacy is the new killer app

A funny thing is happening in the wake of the Edward Snowden NSA revelations, the infamous iCloud hack of celebrity nude photos, and the hit parade of customer data breaches at Target, Home Depot and the U.S. Postal Service. If it's not the government looking at your data, it's bored, lonely teenagers from the Internet or credit card fraudsters.

By Matt Weinberger | 15 November, 2014 02:37

Tags: Target, security, data privacy, nsa, Home Depot, U.S. Postal Service, Facebook, privacy

Room to grow: Tips for data center capacity planning

Capacity planning needs to provide answers to two questions: What are you going to need to buy in the coming year? And when are you going to need to buy it?

By Thomas A. Limoncelli, Strata R. Chalup and Christina J. Hogan | 14 November, 2014 05:59

Tags: virtualization, services, Server Virtualization, (no company)

Microsoft Security Essentials may be throwing false positives for Trojan:DOS/Alureon.J

It's looking more and more likely that Microsoft Security Essentials (MSE) is warning about a Trojan:DOS/Alureon.J infection when none exists.

By Woody Leonhard | 08 October, 2014 22:30

Tags: forum, security, Microsoft, Malwarebytes

Blowing the whistle without blowing your career

Technology professionals are among today's most infamous whistleblowers. The list of those who have made headlines for exposing corporate or government skulduggery includes Shawn Carpenter, a network security analyst who blew the lid off a Chinese cyberespionage ring; Bradley (now Chelsea) Manning, who shared more than 250,000 classified State Department cables with WikiLeaks; and Edward Snowden, who leaked top-secret information about NSA surveillance activities.

By Cindy Waxer | 08 October, 2014 00:16

Tags: U.S. Department of Labor, IT careers, wikileaks, careers, IT management

Sorriest technology companies of 2014

It's so far been another sorry, sorry year in the technology industry, with big name companies, hot startups and individuals making public mea culpas for their assorted dumb, embarrassing and other regrettable actions.

By Bob Brown | 30 September, 2014 01:11

Tags: Internet-based applications and services, Google, security, Microsoft, data breach, internet, social media, cloud computing, iOS 8, Apple

Supervalu breach shows why move to smartcards is long overdue

The data breach disclosed by Supervalu is another reminder about why the ongoing migration of the US payment system to smartcard technology can't happen fast enough.

By Jaikumar Vijayan | 16 August, 2014 20:49

Tags: Cybercrime and Hacking, data security, security, visa, mastercard, data protection

Where your personal data goes when you're not looking

What businesses know about any given individual is a lot. But what are companies doing with that data? Not as much as you might think -- at least not yet. Companies are getting more sophisticated, however.

By Robert L. Mitchell | 06 August, 2014 01:33

Tags: security

Boost your security training with gamification -- really!

Getting employees to take security seriously can be a game that everyone wins.

By Lamont Wood | 17 July, 2014 14:05

Tags: consumerization of IT, Lance, security,, IT management

Apple-IBM deal threatens Android's enterprise push

The new Apple-IBM partnership seems sure to help Apple sell more iPads to businesses, but it may also be setting off alarm bells at mobile device management companies large and small.

By Matt Hamblen | 17 July, 2014 02:57

Tags: Mobile/Wireless, Networking, ios, IBM, wireless, operating systems, LANDesk, mobile, Blackberry, Apple, Google, symantec, Mobile device management, Microsoft, SAP, software

Revamping your insider threat program

Companies including MITRE are looking at privileged access and how to better lock it down -- without stopping employees from doing their jobs.

By Sandra Gittlen | 14 July, 2014 20:33

Tags: Target, National Security Agency, security, wikileaks

What vacation? Expect to work while you're away

In these lean times, backups aren't what they used to be; it's inevitable that IT staffers will be called to help, especially when an important issue is brewing.

By Esther Shein | 10 July, 2014 21:23

Tags: symantec, IT careers, IT management, staff management, Constant Contact

Google's move into home automation means even less privacy

Plans by smart thermostat maker Nest Labs to share some customer data with corporate parent Google means the search engine giant will be fending off privacy concerns as it expands into home automation.

By Jaikumar Vijayan | 27 June, 2014 04:58

Tags: security, Emerging Technologies, hardware systems, logitech, internet, Internet Search, jawbone, privacy, search engines, whirlpool, Google

With Android L, Google makes pitch for enterprise users

Google will provide enterprise-focused security and management features to its entire Android showcase of mobile devices, including features reserved only for Samsung devices running Samsung security software called Knox, a Google executive announced during the Google I/O keynote address Wednesday.

By Matt Hamblen | 26 June, 2014 06:59

Tags: Google, consumer electronics, security, Android, smartphones, mobile security, Kno, mobile apps

XPocalypse, not now

Two months after Microsoft ended support for Windows XP, the catastrophic wave of exploits security experts expected to wash over the aged operating system have failed to materialize.

By Gregg Keizer | 09 June, 2014 04:53

Tags: Cybercrime and Hacking, Microsoft, Windows, software, operating systems, Malware and Vulnerabilities

Beware the next circle of hell: Unpatchable systems

Insecure by design and trusted by default, embedded systems present security concerns that could prove crippling

By Paul Roberts | 02 June, 2014 20:10

Tags: HP, computer hardware, security, Microsoft, Endpoint Protection

Malvertising rise pushes ad industry to action

With hidden malware on the rise, the online advertising industry may finally have to get its governance act together.

By Robert L. Mitchell | 29 May, 2014 21:13

Tags: U.S. Federal Trade Commission, e-commerce, security, Sena, internet, Blue Coat Systems, e-business, privacy, Federal Trade Commission, Yahoo

Is EU's 'right to be forgotten' really the 'right to edit the truth'?

With Europe's top court ordering Google to allow people to basically edit their online personal histories, some wonder what this will mean for finding the truth online.

By Sharon Gaudin | 15 May, 2014 06:23

Tags: Gov't Legislation/Regulation, Google, security, european union, regulation, internet, government, Internet Search, privacy, search engines

Top Whitepapers

Twitter Feed

Featured Whitepapers