The Plural Of Data Is Not Analytics
When it comes to security monitoring, searching and reporting aren’t always enough. The added value comes from analytics: turning data into information
14 Amazing DARPA Technologies On Tap
Go inside the labs of the Defense Advanced Research Projects Agency for a look at some of the most intriguing technologies they're developing in computing, electronics, communications, and more.
Mozilla Persona Aspires To Kill Passwords
Mozilla system promises Web authentication without site-specific passwords. User's browser will generate a cryptographic 'identity assertion' that expires after a few minutes.
NIST Funds Trusted Identity Pilot Programs
National Institute of Standards and Technology programs are intended to create a trustworthy online environment for consumers and businesses, and for institutional transactions.
Microsoft Patches IE Bug
Microsoft plans to issue a patch Friday to deal with the latest in a barrage of zero-day exploits for Internet Explorer.
Cyber Warfare Still Poses Legal Questions
A body of accepted international law on cyber warfare slowly is emerging, but more needs to be done to address new world of aggression, civilian and military officials said Tuesday.
Mikko's Malware Odyssey
Security guru Mikko Hypponen talks malware evolution, factory-automation vulnerabilities, Space Invaders, and jamming to Justin Bieber
Services Can Help Identify Mobile Risks
While mobile device management (MDM) services can help a company manage its employees phones and tablets, figuring out whether the devices are up-to-date is also critical