- How to fix the two-factor authentication log-in error in Gmail on Android
- Tutorial: How to fix app store errors in Windows 8
- Akamai admits its OpenSSL patch was faulty, reissues keys
- Glass all gone after one-day sale, Google says
Now that the US National Institute of Standards and Technology has finalized the much-discussed cybersecurity framework, organizations can use it as the guideline for measuring how well their systems are secured.
By Joab Jackson | 14 February, 2014 21:47
Controversial crypto technology known as Dual EC DRBG, thought to be a backdoor for the National Security Agency, ended up in some Cisco products as part of their code libraries. But Cisco says they cannot be used because it chose other crypto as an operational default which can't be changed.
By Ellen Messmer | 17 October, 2013 20:09
Following through on an order earlier this year from U.S. President Barack Obama, the National Institute of Standards and Technology (NIST) is rapidly developing a set of guidelines and best practices to help organizations better secure their IT systems.
By Joab Jackson | 29 August, 2013 20:59
The National Institute of Standards and Technology (NIST) and Stanford University have partnered to save for posterity over 15,000 software programs created in the early days of microcomputing.
By Joab Jackson | 08 March, 2013 17:09
Any business that anticipates using cloud-based services should be asking the question: What can my cloud provider do for me in terms of providing digital forensics data in the event of any legal dispute, civil or criminal case, cyberattack or data breach?
By Ellen Messmer | 06 March, 2013 20:15
This whitepaper is the second in a three-part series on distributed denial of service attacks (DDoS) and multi-tier DDoS protection. This section details the design and capabilities of different forms of protection architecture designed for a variety of circumstances, while also providing alternative approaches. The paper also explains how to maintain availability, including network and application defense and DNS DDoS Mitigation.
- FTBrand Relationship Manager | RTB Trading Desk | Digital Advertising | SydneyNSW
- FTIT Support EngineerNSW
- FTCampaign Managers | RTB | Display + Video | Trading desk |SydneyNSW
- FTMicrosoft Business Intelligence DeveloperNSW
- FTOBIEE BI/DW ConsultantNSW
- FTMicrosoft Business Intelligence ConsultantNSW
- FTContent StrategistNSW
- FTDeliverability SpecialistNSW
Due to a lack of consumer confidence and a subsequent drop in sales, all entities that handle credit cardholder information are being challenged to adopt more effective data protection measures. This paper provides information on available tools to help validate compliance with the latest version of the Payment Card Industry Data Security Standard (PCI DSS).
- Google invites Glass wearers to brave LA's beaches
- Telerik frees HTML5 collection of components
- Space X rocket en route to ISS with space laser cargo
- AMD steers clear of low-cost tablet market
- Experts: Avoid big mistakes with Oracle's Exadata
- Steve Jobs' character becomes issue in Silicon Valley no-hiring case
- FCC vote on incentive auction plan could further open broadband competition
- Google tech to bring 3D mapping smarts to NASA's space station robots
- Plastic computers taking shape, but won't replace silicon
- Apple has bigger plans than just song ID with Shazam deal
- Satellite communication systems rife with security flaws, vulnerable to remote hacks
- Americans cool with lab-grown organs, but not designer babies
- IE6: Retired but not dead yet
- Twitter to promote app downloads in mobile timelines
- Can you hear me now? NASA to test laser communication system