The view from the top of IT with TechWorld Editor Rohan Pearce
Controversial crypto technology known as Dual EC DRBG, thought to be a backdoor for the National Security Agency, ended up in some Cisco products as part of their code libraries. But Cisco says they cannot be used because it chose other crypto as an operational default which can't be changed.
By Ellen Messmer | 17 October, 2013 20:09
Following through on an order earlier this year from U.S. President Barack Obama, the National Institute of Standards and Technology (NIST) is rapidly developing a set of guidelines and best practices to help organizations better secure their IT systems.
By Joab Jackson | 29 August, 2013 20:59
The National Institute of Standards and Technology (NIST) and Stanford University have partnered to save for posterity over 15,000 software programs created in the early days of microcomputing.
By Joab Jackson | 08 March, 2013 17:09
Any business that anticipates using cloud-based services should be asking the question: What can my cloud provider do for me in terms of providing digital forensics data in the event of any legal dispute, civil or criminal case, cyberattack or data breach?
By Ellen Messmer | 06 March, 2013 20:15
In a look at the number of vulnerabilities recorded over 25 years in software products and open source, a researcher at Sourcefire has determined that Microsoft Windows XP and the Mozilla Firefox browser stand out as the two with the largest number of high-severity vulnerabilities.
By Ellen Messmer | 25 February, 2013 15:02