Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Thursday, July 30, 2015
Despite H-1B lottery, offshore firms dominate visa use
Using B2B integration technology, digital networks allow companies to manage, secure and optimize data transactions across all industries and in every corner of the globe. Read this whitepaper to learn more. Learn More
Intel and Micron may be touting their new 3D XPoint memory as the first new class of memory since 1989, but it bears a remarkable resemblance to another memory that's been around for years. That said, 3D XPoint is in a league of its own. READ MORE
Several versions of the Android OS for smartphones have appeared on the global stage in recent years. One version, Cyanogen OS, has gathered publicity as well as prominent investors -- including Twitter, Qualcomm and Foxconn -- that could give it some staying power. READ MORE
The cyberespionage group that stole the personal records of millions of Americans from U.S. health insurer Anthem and the U.S. Office of Personnel Management has also reportedly breached United Airlines. READ MORE
In Damballa's latest State of Infections Report, we show how an initial click-fraud infection, observed in our Threat Discovery Center in May 2015, morphed into CryptoWall within two hours. An enterprise security team would likely never have seen this transformation unless they were instrumented to detect post-compromise activity. Learn More
Vector Watch Group is launching its new smartwatch, and the company's not phoning it in. The plucky, London-based tech-jewelry maker is proudly showing off its entry into the nascent wearables market. READ MORE
Meet the industry's first adaptive, threat-focused next-generation firewall (NGFW) designed for a new era of threat and advanced malware protection. Cisco® ASA with FirePOWER Services delivers integrated threat defense for the entire attack continuum - before, during, and after an attack. Learn More
Peruse our library of free digital magazines! Choose from a collection of smartly designed digital magazines, which include our most popular departments -- News Analysis, Features, Opinions and Shark Tank -- all free for download with registration. These digital magazines also feature Computerworld signature packages, including our IT Careers 2015 Special Report, with the latest on hot skills and hiring trends, and our Forecast 2015 report, with unique insights into the IT budgets, project priorities and staffing strategies of top IT leaders.
The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.
Internet of Things: Get the latest news! Our bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the Internet of Things (IoT). Subscribe now and stay up to date!