Managing The Multi-Vendor Backup
Backup management applications go a step beyond monitoring, but they remain limited. It's time to develop a framework-driven approach.
10 Top Government Data Breaches Of 2012
SQL injection, post-phishing privilege escalation, and poorly secured back-up information all played their part in exposing sensitive government data stores this year
New Hack Abuses Cloud-Based Browsers
Researchers show how attackers could anonymously pilfer free cloud computing power -- for cracking passwords, denial-of-service attacks, or other nefarious activities
Thanksgiving SCADA Bug Hunt
Researcher scares up more than 20 SCADA vulnerabilities -- one in just seven minutes -- on Thanksgiving Day
A Backhanded Thanks
As we recover from the Thanksgiving weekend, let's give our brand of security thanks for all the good (and not so good) in our world
Spy Tech: 10 CIA-Backed Investments
Check out some of the latest technologies to win funding from In-Q-Tel, the venture investment arm of the CIA and other intelligence agencies. That's the first step toward use by agents and analysts.
Anonymous Steps Into Gaza Crisis
Website defacing and Anonymous DDoS campaign pale next to ongoing cyberattacks apparently launched from Iran and Palestine, security experts say.