Menu

Security / Features

Three key challenges in vulnerability risk management

Vulnerability scanning provides visibility into potential land mines, but often just results in data tracked in spreadsheets and independent remediation teams scrambling in different directions. It is time to change from a “find” mentality to a “fix” mentality. Here’s how.

Written by By Michelangelo Sidagni, CTO, NopSec04 Sept. 15 15:54

Inside Apple's odd, yet effective, social media strategy

Apple does social media differently than its peers in the tech world, and though it isn't ignoring social to the extent it did in the past, you shouldn't expect to see any official @Apple account on Twitter anytime soon.

Written by Matt Kapko02 Sept. 15 15:11

Shadow BYOD runs rampant in federal government

A new survey highlights the extent to which government employees insist on bringing their own devices to work, despite rules to the contrary.

Written by Kenneth Corbin01 Sept. 15 18:15

U.S. readies sanctions against China for cyber-spying

As the Obama administration prepares to impose sanctions on Chinese companies for economic cyber-espionage, experts question whether the penalties will have significant effect

Written by Fahmida Y. Rashid31 Aug. 15 21:42

Virginia shooting exposes dark side of social video

The tragic killing of two reporters during a newscast last week played out live on Facebook, Twitter and YouTube. The alleged shooter's use of social media raises questions about how popular social services manage auto-play video.

Written by Lauren Brousell31 Aug. 15 19:03

10 years from Hurricane Katrina: IT lessons learned

Ten years after Katrina devastated New Orleans, IT pros say being less dependent on physical locations is just one of the keys to ensuring your company doesn’t go out of business when disaster strikes.

Written by Tony Bradley28 Aug. 15 17:26

Who can stop malware? It starts with advertisers

Malware masquerading as advertising is a growing problem, and the ad industry must figure out how to weed out scammers from legitimate companies

Written by Fahmida Y. Rashid28 Aug. 15 13:00

Facebook M virtual assistant could be all about ads

Facebook has big plans for M, its new virtual assistant that provides a mix of human and machine-driven intelligence, but it will have to earn the trust of users if M is to rival Siri or Google Now.

Written by Matt Kapko27 Aug. 15 23:43

Why social media could swing the 2016 presidential election

Candidates in the 2016 U.S. presidential election use more social networks than politicians of the past, in hopes of tapping the millennial market. However, it's difficult to measure real ROI, and the social trail is fraught with political perils.

Written by Lauren Brousell27 Aug. 15 14:55

4 security metrics that matter

Today, management demands metrics to get a clearer view of security. Here are four metrics that deliver actionable insight -- and a few others with less value

Written by Fahmida Y. Rashid26 Aug. 15 13:00

Ashley Madison -- Can it possibly get any worse? (tl;dr: YES)

The Ashley Madison hack continues to make headlines. Naturally, that's because the news keeps getting worse. Worse for website owners Avid Media Group. And worse for the REAL victims, more importantly -- the people named in the hacked data dump...

Written by Richi Jennings25 Aug. 15 13:51

9 steps to make you completely anonymous online

The default state of Internet privacy is a travesty. But if you're willing to work hard, you can experience the next best thing to absolute Internet anonymity

Written by Roger A. Grimes25 Aug. 15 13:00

BYOD – the tech revolution that wasn’t

Once upon a time, BYOD and the consumerization of IT was held up as a paragon of productivity and cost savings for enterprises that embraced the concept. Now? Not so much… What happened?

Written by Jen A. Miller20 Aug. 15 14:59

Google cloud ''loses'' data (sky falling; film at 11)

Google is sorry to report it's lost some cloud customers' data. Lightning struck four times near its St. Ghislain, Belgium data center. From cloud to cloud, as't were, causing some storage to go bye-bye...

Written by Richi Jennings20 Aug. 15 13:20

Market Place

Computerworld
ARN
Techworld
CMO