The Last Rites of Traditional IT Security

Anti-Virus (AV) software, along with its Firewall side-kick, has been the standard weapon against Internet borne threat for the past two decades. But in a changing threat landscape AV is fast beginning to look past its sell-by date.
Overcoming Data Residency Issues

Dave Anderson, Senior Director, Voltage Security, explains how organisations can overcome a common barrier to cloud computing adoption
New effort to fully audit TrueCrypt raises $16,000+ in a few short weeks

For nearly a decade, TrueCrypt has been one of the trusty tools in a security-minded user’s toolkit. There’s just one problem: no one knows who created the software. Worse still, no one has ever conducted a full security audit on it—until now.
Facebook loosens its rules on teen privacy

Facebook announced Wednesday that it is loosening privacy rules for its teen users.
Yahoo Should Consider SSL a Minimal Security, Privacy Standard for Email

Yahoo is being second-guessed more today than a mediocre baseball manager.
KPMG buys 3,500 BlackBerry 10 smartphones

Consulting firm KPMG has bought 3,500 new BlackBerry 10 (BB10) smartphones for use by staff in its Milan office, despite ongoing questions over the Canadian firm’s long-term future.
In the future, ‘smart’ store shelves that sense your impulses

The maker of Cadbury chocolate, Oreo cookies and Trident gum is developing “smart” store shelves that use sensor technology to personalize, and therefore encourage, the pleasure-seeking impulse purchases that drive sales of those products.
Akamai Releases Second Quarter 2013 State Of The Internet Report

Akamai, a leading provider of cloud services for delivering, optimizing and securing online content and business applications, today released its Second Quarter, 2013 State of the Internet Report.
Apple’s iCloud protocols cracked and analyzed

Smartphones carry a lot of sensitive data that in theory should be accessible only to their owners. In practice, a lot of it can be exfiltrated from the devices and from the backups either stored on the device or in the cloud
Overusing the Term Hacking Impacts Security Awareness

I’ve heard the term hacking used for non technical things a few too many times lately. It makes me wonder if perhaps its overuse is making the average person not care about security because they believe it’s a purely technical issue