Big data investments in 2013 continue to rise, with 64 percent of organizations investing or planning to invest in big data technology compared with 58 percent in 2012, according to a survey by Gartner.
Author: ISBuzz Team
The biometrics team of Germany’s well-known Chaos Computer Club (CCC) claims it has “cracked” Apple’s Touch ID system.
HP unveiled its new family of HP TippingPoint Next-Generation Firewall (NGFW) appliances to further protect customers from threats introduced by mobile and cloud computing.
Having worked in IT for nearly two and a half decades, I’ve certainly seen my share of blame and abuse thrown the way of IT. Whether the network is down or the application is unavailable
It seems, based on recent announcements from the likes of HP and CrowdStrike, that crowdsourcing and open source are really taking off as ways of getting the information security industry sharing the latest cyber threat intelligence.
Lancope, Inc., a leader in network visibility and security intelligence, will deliver a complimentary webinar on Thursday, Sept. 26 at 11:00 a.m. U.S. Eastern time entitled, “Hunting Attackers with Network Audit Trails.”
When looking at recent case law and Supreme Court rulings on how advances in technology affect the rights of the accused it appears to be a mixed bag.
In the era of the internet, hackers are seen as noble figures – anarcho-libertarians, standing up to the man, exposing government secrets and corporate misdeeds.
Most security professionals agree that we can’t effectively stop malware by blacklisting signatures; the approach used by most antivirus applications.
It appears the verified Twitter account British rapper Costadinos Contostavlos, better known as Dappy, has been hacked.