It's sad but true that some of the world's best minds in computing have dedicated themselves to creating new ways to attack information technology infrastructures. The assaults have resulted in a significant cost factor in enterprise computing, influencing the purchasing decisions both for general-purpose processing, storage and networking products and for specialized security hardware, software and services.
- Look for the silver lining in GDPR’s privacy obligations
- GDPR is here, but few Australian staff know what to do about it
- FBI takes control over Russia's VPNFilter router botnet
- Cisco reveals VPNFilter malware infects 500k routers, Ukraine fears they'll be bricked by Saturday
- CPUs take another Spectre-Meltdown speculative execution hit