cyberwar - News, Features, and Slideshows
Rules of engagement between different countries should be established before a major Web-based attack takes place according to BT Group’s US chief security technology officer, Bruce Schneier.
By Hamish Barwick | 08 November, 2011 16:59
Countries will continue to press the envelope to determine how much damage can be inflicted before the United States declares a cyberwar according to a Federal Bureau of Investigation (FBI) associate.
By Hamish Barwick | 20 June, 2011 15:39
Cyber warfare strategy is getting so sophisticated that network attacks suitable for major assaults are being used instead as trial runs meant solely to probe enemies with the aim of figuring out what their defenses are, an audience at an Interop security talk was told.
By Tim Greene | 14 May, 2011 02:45
Collaboration and training are vital to the success of security projects, according to Westpac’s Chief Information Security Officer, Richard Johnson.
By Lisa Banks | 02 October, 2010 09:26
When Canadian food distributor George Weston Limited moved to Microsoft Office 365, it chose F5 Application Delivery Controllers to centrally manage user traffic to its Active Directory Federation Services (ADFS) servers.
Enterprise initiatives designed to facilitate mobility can deliver important benefits to your organisation. This paper suggests best practices for selecting the right devices and implementing the most effective management solutions • Employees need devices that match preferences while meeting business and IT requirements • You must determine which devices to allow/recommend as part of a choose-your-own-device (CYOD) or member purchase plan (MPP) • IT groups need a solution that can support new technologies that may emerge in the future
- Think North Korea hacked Sony? Think about this
- Uber temporarily suspends service in Portland
- The 'grinch' isn't a Linux vulnerability, Red Hat says
- Hybrid cloud adoption set for a big boost in 2015
- Driver's license app on a smartphone raises privacy issues
- Worst security breaches of the year 2014: Sony tops the list
- Messaging app Line buys Microsoft's MixRadio music-streaming app
- Vulnerability in embedded Web server exposes millions of routers to hacking
- Amazon Web Services updates console to simplify management
- Uber driver in Boston area faces rape charges
- Sony hit with second employee lawsuit over hack
- Point-of-sale malware creators still in business with Spark, an Alina spinoff
- Microsoft nixes EU browser ballot screen
- U.S.-Cuba breakthrough is no slam dunk for Internet