Monitoring A La Borg
Commentary | 12/24/2012 | What would a true infrastructure collective look like?
The 5 Coolest Hacks Of 2012
Nothing was sacred -- the nation's airspace, home power meters, videoconferences, and, in an ironic twist, popular cybercrime tools
9 Ways Hacktivists Shocked The World In 2012
Despite the arrests of alleged LulzSec and Anonymous ringleaders, ongoing attacks -- including Muslim hackers disrupting U.S. banks -- prove hacktivism remains alive and well.
The Identity Cliff
Commentary | 12/18/2012 | Kicking the can down the road on identity cannot go on forever. Not choosing to deal with improving identity and access architecture is a choice
A Guide To Practical Database Monitoring
Quick Hits | 12/18/2012 | A look at what database activity monitoring can and can't do, and some recommendations on how to implement the best system for your organization
Five Significant Insider Attacks Of 2012
From the recent theft of counterterrorism data from Switzerland's intelligence agency to remotely wiretapping boardroom videoconferencing systems, a number of attacks had an inside component
U.S. Creates System To Look For 'Future Crimes'
In March, the United States granted counterterrorism officials the ability to hold data on Americans for up to five years. Now, the controversy surrounding the data-analysis program has come to light
McAfee Back In U.S.: Crazy Like A Fox?
Guatemala refuses asylum request and deports AV founder McAfee to Miami. Officials in Belize dismiss McAfee's claims that he's being persecuted by government, call him "bonkers."
|