Malware Threatens Medical Device Security
Hospitals must contend with older operating systems that lack the latest security patches, and cope with the convergence of medical devices, EHRs, and mobile apps.
Could Hackers Change Our Election Results?
Many of the same vulnerabilities exist in electronic voting systems as the last time we elected a president, and new ones abound that could put voter databases at risk and undermine civic confidence
The Secure Operating System Equation
Many experts like the idea of a purpose-built, secure operating system. It's just that adopting one is not so straightforward, even if it's specifically for security-strapped SCADA systems
How Fusion-io Makes The World's Data Go Faster
Fusion-io exec describes how the company's hardware and software enable data center managers to build faster, more cost-effective storage arrays, in the latest episode of Valley View.
What Huawei, ZTE Must Do To Regain Trust
Commentary | 10/16/2012 | The U.S. is not the only country scrutinizing the security of Chinese-made telecom equipment from Huawei and ZTE. Without major changes, significant contracts are at risk.
How One Midsize Bank Protects Against Hacks
In light of ongoing hacktivist attacks on major banks, Lake Trust Credit Union information security pro shares insights on how a smaller bank stays secure without too-big-to-fail resources.
Keeping Data Out Of The Insecure Cloud
Companies looking to keep their data safe need to give their employees a choice of solid file-sharing services and apps. Otherwise, it's back to their insecure favorites
A False Sense Of Security
Commentary | 10/15/2012 | Cutting-edge security technologies are critical to safeguarding data integrity. However, organizations need to also focus on developing effective policies and practices to fully protect crucial information assets
Should You Buy From Huawei?
Commentary | 10/15/2012 | Congress says U.S. companies should not purchase products from Chinese firms Huawei and ZTE, citing national security concerns. I say Congress is dealing more in fear than facts.
Advertisers' 'Do Not Track' Protests Fail Smell Test
Commentary | 10/11/2012 | An almost comic war of words continues between advertisers and Microsoft regarding do not track technology in Internet Explorer 10. Funny thing: The only tracking option advertisers want is opt-out.
Walking The Mobile Mile
Commentary | 10/10/2012 | Putting the 'i' in identity means navigating the hidden complexities in mobile identity
Mild-Mannered Malware Sleuth Rocks Security
Botnet and malware expert Joe Stewart chats up his self-taught skill of picking apart malware and botnets, how targeted companies are in denial, Metallica -- and his raucous rock 'n' roll years
Appthority & The Mobile Enterprise
Dark Reading Videos | 10/9/2012 | Some of the most innovative new enterprise technologies come from start-ups, but doing business with them can be risky, given their unproven products and short track records. With Anthony Bettini, Co-Founder and CEO of Appthority.
|