It's sad but true that some of the world's best minds in computing have dedicated themselves to creating new ways to attack information technology infrastructures. The assaults have resulted in a significant cost factor in enterprise computing, influencing the purchasing decisions both for general-purpose processing, storage and networking products and for specialized security hardware, software and services.
- Sitting ducks for cybersecurity breaches, small businesses get new options
- GCHQ: change your passwords now even if Uber says it contained the breach
- Christmas rush brings great deals to online shoppers – and new risks for their employers
- Dell, Lenovo, HP will patch hundreds of devices affected by Intel's buggy embedded CPU
- As unencrypted data becomes “negligence”, business leaders are taking encryption strategy away from IT