Please turn on your JavaScript for this page to function normally.
Testing the cloud

Managing IT networks requires a broad set of competencies in a growing number of technologies and products. It therefore makes sense that these competencies are centralized in …

Power to the people: Securing consumerized devices

The consumerization genie is out of the bottle. Employees are increasingly using consumer-focused websites and apps such as Twitter, Facebook and LinkedIn for work-related …

A look at Booz Allen leaked passwords

The recent attack against Booz Allen led to 90,000 leaked passwords. Unlike previous breaches where the passwords weren’t encrypted, it looks like in this case some care …

Why Dropbox’s security changes are going to improve cloud computing

On July 1, Dropbox announced a revision to its terms of service, privacy policy and security overview document. While the intention of the update was to make Dropbox’s …

How to secure a moving target with limited resources

Today, as security threats increase and regulatory requirements grow more complex, businesses are recognizing that compliance and security are business-critical priorities. …

Security threats: Unwrapping 2011

2011 has been a busy year so far for cyber criminals. No one can say IT security incidents went under reported, they have certainly been prominent in the headlines. HBGary …

The future of identity verification through keystroke dynamics

When someone mentions biometrics, the first (and sometimes the only) thing that comes to mind to many people are physical characteristics on the basis of which people can be …

Security precautions for mobile business applications

Mobile applications have become one of the hottest trends, but this has come at a price. The sharp rise in popularity means businesses are rushing their apps to the market, …

The mobile security conundrum

Whilst the range and variety of IT security defenses for portable computers – that’s netbooks and laptops to most people – is excellent, and able to cater …

Will we finally see a federal data breach notification law?

Embarrassing losses of personal data, whether due to intrusions into computer networks or sheer carelessness, seemingly are weekly news fodder. The recent PlayStation data …

Business continuity: You need more than just a plan

Stop for a moment and take a look around you – IT isn’t just the computer on your desk, the lap top in your bag or the mobile in your pocket. The truth is …

25 years of mobile security

This year marks the 25th anniversary of my first foray into mobile security. True story. Back in the day, the early halcyon days of mobile computing, any device weighing in at …

Don't miss

Cybersecurity news