You need a dedicated SSL inspection platform to eliminate the blind spot in your defenses
The IT Modernization fund has important goals that won’t be reached until well after the current administration expires.
Nearly three years after former NSA contractor Edward Snowden first leaked details about massive domestic spying, his revelations have prompted a broader discourse, especially among legal scholars, over the potentially invasive nature of big data cybersurveillance tools.
What to look for when shopping for these new tools
While most of the fixes for Java, Database, and MySQL are run-of-the-mill, four are rated critical if the targeted user has administrator privileges
By Fahmida Y. Rashid | 22 January, 2016 04:03
A former CISO in a critical infrastructure sector shares his thoughts
The European Commission has approved the most stringent data privacy regulation anywhere and it is sure to impact businesses worldwide
Today’s deception technologies abandon reliance on known attack patterns and monitoring and use advanced luring techniques and engagement servers
Executive News Editor Ken Mingis and Computerworld staffers discuss the sorry state of health record security and bold predictions for the coming year in IT.
The year's most significant attacks highlight how hackers are changing tactics -- and how IT security must evolve in the year ahead
By Fahmida Y. Rashid | 28 December, 2015 14:00
Despite the risks to online commerce, international high-tech sales, security of trade secrets and the fact that it won’t actually make encryption useless to criminals, decryption backdoors to let law enforcement access encrypted communications could become U.S. law in 2016 – and a nightmare to enterprises – especially if terrorists succeed in carrying out major acts of violence.
By Tim Greene | 16 December, 2015 21:13
Thanks to technical advances and increased adoption, securing your data and communications is a lot easier than you might think
Data breaches made big news in 2015 as measured by a variety of criteria that range from the number of records compromised to the types of data stolen to the potential threat to specific groups such as children.
By Tim Greene | 02 December, 2015 21:12
Do as I say, not as I do: Admin mistakes often surpass the severity of those made by users. Here are 10 of the most common -- and their remedies
With attackers preying on the security gaps created by encrypted traffic, let’s examine the five most common network traffic inspection errors made today
The guidelines provide guidance for enterprises, government agencies and auditors for implementing Secure Shell key management practices and polices
Forget Nigerian princes -- today’s spearphishing is sophisticated business, fooling even the most seasoned security pros
Criminal organizations don’t have James Bond’s resources, but are sophisticated and well funded so you have to continually up your efforts to reduce the threat surface
Website defacements? Database dumps? Mysterious files? Here's how to tell if your Web application has been hacked -- and how to secure it once and for all
With the Cybersecurity Information Sharing Act (CISA) the feds are trying to make it more attractive to share threat intelligence, but it won’t do much to help businesses deal with the high cost of sorting through what can be an overwhelming flow of possible security incidents.
Flash storage represents a quantum leap from the storage layer in terms of performance, however it is crucial companies understand their I/O profile in order to formulate a successful storage strategy. Find out in this eBook how flash storage can be beneficial for enterprises and useful questions to ask before making an informed decision on the purchase.
- CCiOS DeveloperNSW
- CCOracle Apex DeveloperQLD
- CCContract System Analyst (SQL/.net) 160205/SA/561Asia
- CCSharePoint DeveloperACT
- CCPython Web Developer - DevOPS EnvironmentVIC
- CCObjective ECMS Technical ConsultantSA
- CCAndroid and iOS DevelopersVIC
- CCEnterprise Architect - Network & InfrastructureNSW
- CCTest AnalystACT
- FTJava Web Development OpportunityVIC
- CCJava Developer - Front/ Back EndVIC
- FTWeb Programmer/ DeveloperVIC
- FTSystems Engineer / Administrator - Managed ServicesNSW
- CCContract Analyst Programmer (Crystal Reports) 160129/AP/vhs-aAsia
- FTCyber Security SpecialistNSW
- FTFront End Developer Required Working World Leading Digital TeamNSW
- CCTest ManagerQLD
- CCContract Analyst Programmer (JAVA/Oracle/UNIX) 160203/AP/381Asia
- CCDesktop Applications PackagerSA
- FTSenior Mobile Developer - IOSNSW
- CCSharepoint AdministratorVIC
- FTProject Manager | SharePoint, Office 365 SkillsVIC
- FTBusiness Intelligence AnalystVIC
- FTLevel 2 IT Support TechnicianVIC
- CCIBM ESB Developer (Junior to mid level role)NSW
This e-book gives insight into what it means to use a hybrid approach to cloud computing and the flexibility and choice that it provides. You will discover the type of technologies and approaches that are imperative for your organisation to create the business value and flexibility the constituents you serve demand.
- Need data-science skills? Now your team can learn together
- Hackers of two Ukrainian utilities probably hit mining and railroad targets, too
- Qualcomm hopes a gradual approach to server market will pay dividends
- VMware’s new management tools are hybrid, hybrid, hybrid
- US Senate passes permanent ban on Internet access taxes
- Navy tests first ‘reversible’ clean energy fuel cell storage system
- Qualcomm's new LTE modem hits a gigabit and touches the future of mobile
- It's official: Older versions of IE are now at risk
- Google execs defend tax deal to UK legislators
- Project Kratos: AWS Lambda functionality, without Amazon lock-in
- Microsoft expands Windows 10 release notes, but experts want more, much more
- Now your phone can scan documents directly to the cloud with Box Capture
- What's next for IBM’s enterprise social business
- Schneier: terrorists will switch to more secure alternatives to avoid encryption backdoors
- Indegy finds out when industrial controls go bad (think Stuxnet)