Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Wednesday, August 12, 2015
FAQ: What you need to know about chip-embedded credit cards
The conversion process from older magnetic stripe cards to chip-embedded credit and debit cards has sped up in recent months because of an Oct. 1 deadline. That's the day when liability for credit card fraud will shift from banks to merchants. This FAQ has everything you need to know. READ MORE
In this paper, we examine the evolution of enterprise applications, the data centers in which these applications reside and the increasing expectations of businesses and end-users on the Quality of Service (QoS) their applications deliver. Learn More
Oracle's chief security officer Mary Ann Davidson would like to get rid of all the reverse-engineering security "weenies." She wants you to know that static analysis is Oracle's job, not yours, and that looking for security vulnerabilities in this way breaks the license agreement. At which point, the Internet exploded. I actually feel sorry for Mary Ann -- there was... READ MORE
You're at your desk, working to finish a project on a deadline when, all of a sudden, your screen freezes and a dialogue box pops up to tell you that your computer is locked and your files will all be destroyed if you don't pay up. Learn More
Experienced software engineers share their thoughts on what differentiates great programmers from good programmers and what it takes to up your coding game. (Insider - free registration required.) READ MORE
This software developer pilot fish is working on a system to allocate freight charges and audit and pay freight bills -- and he thinks it's coming along fine. "But I came in one morning and found several managers, accounting types and others in my cube," says fish. READ MORE
There is no understating the impact of security and network connectivity on today's cloud environments. Yes, clouds can scale, expedite processing, and reduce costs, but they also incur risks associated with multi-tenancy, availability, and access control. Learn More
Peruse our library of free digital magazines! Choose from a collection of smartly designed digital magazines, which include our most popular departments -- News Analysis, Features, Opinions and Shark Tank -- all free for download with registration. These digital magazines also feature Computerworld signature packages, including our IT Careers 2015 Special Report, with the latest on hot skills and hiring trends, and our Forecast 2015 report, with unique insights into the IT budgets, project priorities and staffing strategies of top IT leaders.
The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.
Internet of Things: Get the latest news! Our bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the Internet of Things (IoT). Subscribe now and stay up to date!