cyberwar - News, Features, and Slideshows
Rules of engagement between different countries should be established before a major Web-based attack takes place according to BT Group’s US chief security technology officer, Bruce Schneier.
By Hamish Barwick | 08 November, 2011 16:59
Countries will continue to press the envelope to determine how much damage can be inflicted before the United States declares a cyberwar according to a Federal Bureau of Investigation (FBI) associate.
By Hamish Barwick | 20 June, 2011 15:39
Cyber warfare strategy is getting so sophisticated that network attacks suitable for major assaults are being used instead as trial runs meant solely to probe enemies with the aim of figuring out what their defenses are, an audience at an Interop security talk was told.
By Tim Greene | 14 May, 2011 02:45
Collaboration and training are vital to the success of security projects, according to Westpac’s Chief Information Security Officer, Richard Johnson.
By Lisa Banks | 02 October, 2010 09:26
Benefits based on Forrester Consulting Study “The Total Economic Impact of Converging SAP Landscapes on Vblock™ Systems”
- FTCampaign Managers | Programmatic / RTB | Display + Video | Trading desk |SydneyNSW
- FTSEM Specialist - SEM AnalystNSW
- FTClient Service Director - Search: SEO & PPCNSW
- FTAccount Manager - DataNSW
- FTStrategic Account Manager - Google AnalyticsNSW
- FTData Product SpecialistNSW
- FTDigital Performance Manager - MediaNSW
- FTDigital Marketing CoordinatorNSW
This paper discusses: • The growing challenge of maintaining information security in today’s evolving enterprise environment • Key advantages of desktop virtualization as an inherently more secure computing architecture • The top ten benefits of using desktop virtualization to strengthen information security • And how you can regain control and reduce risk without sacrificing business productivity and growth
- Vietnam police hunt hackers behind mass outage
- Apple to stop SSL 3.0 support for push notifications soon
- Xiaomi moving data outside China following privacy concerns
- At Austin airport, Wi-Fi predicts how long the security line will be
- Twitter weaves Fabric, but will developers be drawn in?
- AT&T signed up 500,000 cars for its 4G network last quarter
- Debian community splits over systemd, but fork still unlikely
- TIO task force to field NBN grievances
- Government regulation on cloud security may spur SaaS use in health care
- Progress builds up developer chops with Telerik buy
- Monumental day for Wikipedia in Poland
- Microsoft misses Windows bug, hackers slip past patch
- IBM's chip business sale gets national security scrutiny
- IBM and Microsoft pledge to make their Clouds compatible
- Some Bank of America customers double-charged with Apple Pay