It may seem strange to say, but there are probably a lot of people involved in IT security who long for the “good old days” when the threats were limited to computer viruses getting downloaded through email and hackers trying to break through a firewall.
Browsing: News & Analysis
We published latest Information security news with experts and Industry leaders insight and analysis
Is the tech ‘language barrier’ getting in the way of your job?
News that the US National Security Agency (NSA) and Federal Bureau of Investigation, tapping into the servers of Internet giants has exposed the US government’s double standards in gathering online data, cyber security analysts have said.
Joe Public received a double ‘slap-to-the-face’ in light of the news that Glasgow City Council has been fined £150,000 for losing two unencrypted laptops, according to Simon Bain, CTO of Simplexo.
China is developing its own software and building its own infrastructure to create a tech industry, says a top computer scientist at the DOE’s Argonne National Laboratory.
Last week, Denmark’s national police revealed that, in the summer of 2012, hackers might have stolen and modified information from the police driving license register, including the personal identity number register (CPR).
Those perturbed about this week’s news that government spies may be perusing all sorts of personal communications might be particularly enthusiastic about the work of Purdue researchers in developing a time cloak to hide data.
There is no ‘safe haven’ for investors when it comes to data security and the onus is on them to scrutinise management.
There’s been a big push around the globe to ramp up data retention rules, which require various online services to keep all sorts of data on their users for a long time, just in case it’s possible that law enforcement officials might need that data at some later date.
The simultaneous explosion of enterprise mobility and cloud adoption has resulted in a “perfect storm” for IT. It’s the “everywhere data” side effect created by bring your own device (BYOD) programs — data is now coming from anywhere and everywhere, making it hard for IT departments to keep up.