Print Issue: June 01, 2011
The Sony PlayStation Network/Qriocity service breach of 77 million records contained a twist that makes it dangerous.
The U.S. government was justified to take control of Coreflood bot servers.
News briefs from the past month regarding Sony, the FBI, privacy concerns, Amazon and other breaking stories.
The risk environment is becoming more complicated as time goes on and criminals become more and more sophisticated.
What, in terms of security, should you expect from your cloud provider?
The explosion of internet-connected mobile devices, combined with the rapid move to cloud-based IT infrastructure and applications, is a security headache of epic proportions for many IT departments.
Using third-party cloud services, enterprises can quickly and affordably increase and decrease service or compute power at will.
Letters from our readers responding to news and opinion items on our website and feature stories and other items in our print magazine.
Data discovery is a fundamental factor in risk mitigation, says PixAlert CEO Gerard Curtin.
The so-called “zero-trust” model – making security ubiquitous throughout the network and not just at the perimeter – offers a fresh way of thinking about defending against threats.
Next post in Features