Awhile back I asked what a mobile wallet was. Today my challenge is even bigger: What is mobile commerce?
Regulatory compliance and risk of a data breach are forcing financial institutions to implement more stringent policies and procedures.
Worried about plugging your device into an unfamiliar port and exposing it to horrible viruses or trojans? Simply put this “USB condom” between the male and female ends before docking and the only thing transmitted will be safe, clean electricity.
Under fire for illegally deleted emails in the $585-million scandal over cancelled power plants, Ontario’s minority Liberal government is touting a new training program teaching political staff how to archive documents.
NASA’s own auditor has recently rated its cloud computing deployments very poorly in a report that raises some interesting questions on the use of the cloud at the space agency.
Don’t be too hasty to link every Poison Ivy-based cyber attack to China. The popular remote access tool (RAT), which we recently detailed on this blog, is being used in a broad campaign of attacks launched from the Middle East, too.
Change is something that happens constantly in the Infosec industry, so how has the role of the CIO evolved with all these changes?
Google, Iran’s nuclear enrichment plant, the government of Pakistan, the US department of defense… many of the largest enterprises and governments have been victims of Advanced Persistent Threats (APT) during the last two years.
Your status updates and tweets could be revealing more than you think
As businesses embrace BYOD, network engineers have to face up to the security implications of random, roving personal devices connecting to the corporate WLAN and accessing networked applications and data.