NEW YORK (AP) — The departure of Target's chief information officer in the wake of the company's massive pre-Christmas data breach highlights the increased pressure facing executives who are charged...
Often the conversation about the security of technology systems is parsed in terms that suggest the biggest risk vector comes from small organizations without the IT budget to ensure good security....
BEIJING (AP) — Chinese President Xi Jinping has put himself in charge of a new body to coordinate cybersecurity, in a sign of Beijing's concern over its vulnerability to online attacks and its desire...
The Trusted Computing Group (TCG) session at the RSA Conference in San Francisco brought together proponents of standardized security technology with interested technology developers and end users....
It started in the laboratory of a university in England. An airborne virus was cultivated. One that could spread like the common cold in densely populated areas, infecting all it came into contact...
There’s an old expression, “I’ve met the enemy and he is us.” When it comes to cyber-security, “us” may just stand for “U.S.” I’ve attended the RSA security conference for many years years and am...
WASHINGTON (AP) — As the Obama administration raced to meet its self-imposed deadline for online health insurance markets, security experts working for the government worried that state computer...
Many of you by now will have read about the Apple security issues in iOS and Mac OS X. Whilst we all wait patiently for Apple to comment on the issue, or better yet to fix it, users are left exposed...
Thankfully, in spite of the media buildup going into the Sochi Olympics of 2014, the Games looks like it will wrap up without a serious a security hitch (well, if you exclude Russia losing to...
Sumo Logic is a company that has slowly and quietly been building credibility for its machine data platform. Essentially Sumo Logic ingests all the information that technology systems spit out and...