The state of remote access security
At the end of 2013, HOB conducted a survey of more than 200 CIOs and CTOs in the U.S. The survey quantified the trends and challenges IT decision makers experience when …
The digital universe will reach 44 trillion gigabytes by 2020
A new EMC study reveals how the emergence of wireless technologies, smart products and software-defined businesses are playing a central role in catapulting the volume of the …
Universities now have access to cybersecurity education
(ISC)2 is making its educational resources, which are updated regularly by its members and industry luminaries, available to academia to help meet the global demand for more …
NSA subverted EU privacy laws, spied on human rights orgs
In a testimony delivered by video-link from Moscow, NSA whistleblower Edward Snowden has revealed to EU parliamentarians that the US NSA is actively spying on human rights …
Heartbleed bug: What regular users need to do
As the news of the existence of the Heartbleed bug in OpenSSL and the implications of its existence trickles down into mainstream media, users are trying to figure out what …
New IDS project spots anomalous system behavior
A team of researchers from Binghamton University have been working on a new intrusion detection approach based on monitoring the behavior of systems and spotting when it …
Whitehat hacker breaches UMD servers to jump-start security remediation
Daving Helkowski, a software architect/engineer working for software consultancy Canton Group, has made a serious mistake that has already cost him his job and might end up …
Breaches expose 552 million identities in 2013
After lurking in the shadows for the first ten months of 2013, cybercriminals unleashed the most damaging series of cyberattacks in history. Symantec’s Internet Security …
TCG releases TPM 2.0 specification for device security
The Trusted Computing Group (TCG) has announced the TPM (Trusted Platform Module) 2.0 library specification, which provides a technology response to the global need for a more …
Lie detection technology that accurately reads eye behavior
A company has discovered how to not just open the window to the soul via one’s eyes, but also accurately determine whether or not that soul is lying. For years, …
Demand for security and Big Data experts grows
A new survey by TEKsystems compares current market conditions to the state of spending, skills needs, and impact areas. The survey represents the views of 244 IT leaders …
Email management lacks innovation, businesses turn to cloud
SolarWinds released survey results highlighting the growing challenge organizations face managing email in an increasingly complex environment where BYOx, mobility and other …