Taking a cue from Twitter, Instagram, and every other social media service out there, Facebook launched support for hashtags last week.
Browsing: News & Analysis
We published latest Information security news with experts and Industry leaders insight and analysis
The IT Transformation Institute’s John Palinkas and Kathy Tito recently “sat down” with IT leader Will Lassalle to discuss his perspective on where IT currently sits as an industry, and where it is likely headed in the coming year
India is preparing to roll out a new cyber-security system, amid reports it was among the top five countries compromised by US surveillance.
Simply put, work consists of one or more tasks that are executed using a process or series of processes to ensure the outcome is as close to ideal as possible. It can vary from extremely consistent to dynamically variable based on changing circumstances.
Could attackers make your web browser mine for bitcoins? How about your TV? Security flaws in some systems might make it possible, say experts.
British spooks went to elaborate lengths to spy on members of the G20 summit when it was held in the UK in 2009.
Apparently GCHQ intercepted foreign politicians’ communications at G20 summits, monitored phones and set up fake internet cafes to gather information from allies.
The most talked-about Cyber Security seminar of recent years visits Glasgow in July. This is your chance to gain practical knowledge on the most pertinent topics surrounding SCADA and real-time system security.
Culture Hack Scotland, Sync’s landmark annual event, will this year take place on the weekend of 12-14 July 2013. For our third – and possibly last ever – event of this kind, we will be hosting a 48-hour hack.
In today’s networked world it has become a business imperative to protect information as it impacts all as-pects of our society – finance, healthcare, government, defense, education as well as entertainment.
The Gartner Security & Risk Management Summit is the premier conference and meeting place for IT and business executives responsible for creating, implementing and managing a proactive and comprehensive strategy for information security, risk management, governance, business continuity management and business resiliency.