BSA - News, Features, and Slideshows
Several technology and digital rights groups have praised a U.S. Senate move toward passing legislation that would rein in the National Security Agency's domestic telephone records collection program.
By Grant Gross | 14 November, 2014 05:06
The U.S government can take action to slow the calls in other countries to abandon U.S. tech vendors following revelations about widespread National Security Agency surveillance, some tech representatives said Friday.
By Grant Gross | 19 July, 2014 06:12
Victorian-based construction firm Telford Building Systems has paid an out of court settlement of $100,000 to BSA | The Software Alliance (BSA) after the firm used unlicensed Autodesk AutoCAD design software and Microsoft Office software.
By Hamish Barwick | 03 June, 2014 16:42
Denva Industries, a Melbourne-based engineering company, has been required to pay an undisclosed amount of damages for its use of unlicensed Siemens PLM NX software.
By Computerworld Australia staff | 11 March, 2014 09:48
Did the National Security Agency trick RSA, the security division of EMC, into including a crypto algorithm that was really an NSA cyber-espionage backdoor into the RSA BSAFE toolkit in order to propagate it through tech industry products?
By Ellen Messmer | 25 February, 2014 22:54
When Canadian food distributor George Weston Limited moved to Microsoft Office 365, it chose F5 Application Delivery Controllers to centrally manage user traffic to its Active Directory Federation Services (ADFS) servers.
Enterprise initiatives designed to facilitate mobility can deliver important benefits to your organisation. This paper suggests best practices for selecting the right devices and implementing the most effective management solutions • Employees need devices that match preferences while meeting business and IT requirements • You must determine which devices to allow/recommend as part of a choose-your-own-device (CYOD) or member purchase plan (MPP) • IT groups need a solution that can support new technologies that may emerge in the future
- Judge questions evidence on whether NSA spying is too broad
- Twitter parody of North Korea's mouthpiece not afraid to crow over Sony's capitulation
- Three ways enterprise software is changing
- Google may launch Android Auto, making your car a big mobile device
- After FBI blames North Korea for Sony attack, now what?
- T-Mobile to pay $90M for unauthorized charges on customers' bills
- Buckle up IT: The enterprise needs you for cloud adoption
- Companies battle for control of Italy's national fiber network
- Obama promises response on Sony hack, says pulling movie was mistake
- Microsoft hits Windows tech support scammers with lawsuit
- Trojan program based on ZeuS targets 150 banks, can hijack webcams
- In 2015, EU aims to sweep away old rules on data protection and copyright
- FBI concludes North Korea 'responsible' for Sony hack
- What we know about North Korea's cyberarmy
- Cyberattack on German steel factory causes 'massive damage'