Print Issue: February 01, 2013
This phenomenon sees applications designed for consumers – such as Dropbox, Skype, Google Apps, WordPress, GoToMyPC – finding their way into the corporate tool box.
The ever-changing nature of malware generates anomalous network behavior that can be detected by leveraging large corpuses of data collected from multiple observation points.
This month’s “Me and my job” features the University of Connecticut’s senior network technician, Mike Lang.
Security pros should be less secretive, says New York City CISO Dan Srebnick.
Despite the ubiquity of the Trusted Platform Module, holdups exist and adoption remains slow. Among them are issues with interoperability, considering Apple, Google and Microsoft all use different standards.
Results from our sixth-annual data breach survey are out next month, but here’s a sampling of what’s to come from our study of budgets, hiring practices, security solutions and more.
PayPal’s Andy Steingruebl knows security is not an insular task. By looking outside of its own walls, the company has taken the fight to the enemy, and helped everyone else in the process.
The United States has established itself as a major force in a new era of combat, but what repercussions do state-sponsored actions in cyber space have on all of us?
This month’s debate covers Hacktivist group Anonymous. Will they take a backseat to more extremist groups in 2013?
The NBA’s New Orleans Hornets needed to provide its off-the-court, but highly mobile staff with a secure method for communicating. It found an enterprise remote access solution that could help.
Next post in Features