The view from the top of IT with TechWorld Editor Rohan Pearce
China's remarkable success in infiltrating U.S. government, military and corporate networks in recent years shouldn't be seen as a sign that the country is gaining on the U.S. lead in cybertechnology, security experts say. They're just very persistent and very good at remaining undetected for long periods of time.
By Jaikumar Vijayan | 20 May, 2013 10:14
New social media privacy laws that have been enacted in several states around the country, or are in the works, present something of a mixed bag for businesses.
By Jaikumar Vijayan | 15 May, 2013 10:10
Alberto Yusi Lajud Pena, found dead in the Dominican Republic two weeks ago, was the leader of the New York cell of an international gang of cyber thieves that authorities allege stole a staggering $45 million from ATM machines around the world.
By Jaikumar Vijayan | 10 May, 2013 20:26
The remarkable success that Chinese state-sponsored groups have had in infiltrating U.S. government, military and corporate networks in recent years should not be mistaken as a sign of growing technical superiority over the U.S. in cyberspace, security experts said.
By Jaikumar Vijayan | 08 May, 2013 15:57
IT can never take all the risk out of a supply chain, but it can help organizations minimize their vulnerability in a world of new threats.
By Howard Baldwin | 30 April, 2013 10:45
Legislation, stealth technologies, and emerging data privacy markets are proving that the battle for our Internet privacy has only just begun
By Dan Tynan | 22 April, 2013 10:05
Our manager finds the time and opportunity to cross a few nagging items off of his to-do list.
By Mathias Thurman | 22 April, 2013 10:04
If you're planning to sell or give away your iPad, then it is essential that your personal information and data be erased from it. If it's running sluggish after a few years, sometimes backing up your data, erasing it from the tablet and restoring it might improve performance.
By Nick Barber | 26 March, 2013 19:43
As more organisations leverage the Cloud for critical business applications, they are discovering one of the greatest challenges is combining existing internal controls with cloud protection efforts.
By John Dix | 25 March, 2013 20:09
Enterprise storage demands are reaching a critical point, and vendors are scrambling to develop new products to deal with the data deluge. We look at how these technologies will help manage the major pain points for storage administrators.
By Robert L. Scheier | 25 March, 2013 10:17
Sure, you want users to comply with security edicts, but would you phish your own employees or share your company's hack history? At least some CIOs say yes.
By Stacy Collett | 25 March, 2013 10:17
Music fans and major recording artists are adopting lossless audio file formats to keep copies of their music thats as close to a master recording as possible, leading to multi-terabyte-sized home music storage systems.
By Lucas Mearian | 21 March, 2013 10:07
Facebook users are constantly being told that their privacy is under siege. Here are seven apps that can help secure your personal data.
By Preston Gralla | 18 March, 2013 10:53
Apple yesterday gave its strongest signal yet that it will continue to support OS X Snow Leopard with patches for the foreseeable future rather than retire the still-active operating system.
By Gregg Keizer | 15 March, 2013 17:47
Genesco, a specialty retailer of footwear, sports apparel and related accessories has sued Visa USA for $13.3 million in fines that were assessed against the company after a credit card data breach in 2010.
By Jaikumar Vijayan | 14 March, 2013 00:11
Before you "like" a friend's or company's post on Facebook, think twice. A new study shows that your Facebook "likes" may be far more revealing than you ever thought.
By Sharon Gaudin | 11 March, 2013 22:21
Out of the blue, phishing attacks previously caught in the spam filter are getting through to employee inboxes.
By Mathias Thurman | 11 March, 2013 10:18
Applying Big Data approaches to information security can help enterprises build better situational awareness capabilities, but implementation could prove to be a major challenge, security experts said at the RSA Conference 2013 being held here this week.
By Jaikumar Vijayan | 28 February, 2013 11:10
China is by far the most aggressive, but not the only, country attempting the sort of extensive cyberespionage described in security firm Mandiant's dramatic report, released this week.
By Jaikumar Vijayan | 20 February, 2013 11:09
They're security myths, oft-repeated and generally accepted notions about IT security that ... simply aren't true. As we did a year ago, we've asked security professionals to share their favorite "security myths" with us. Here are 13 of them.
By Ellen Messmer | 15 February, 2013 23:19