Katherine Noyes

Senior U.S. Correspondent

Katherine Noyes has been an ardent geek ever since she first conquered Pyramid of Doom on an ancient TRS-80. Today she covers enterprise software in all its forms, with an emphasis on cloud computing, big data, analytics and artificial intelligence.

Meet Apache Spot, a new open source project for cybersecurity

Why quantum computing has the cybersecurity world white-knuckled

Why quantum computing has the cybersecurity world white-knuckled

As quantum computers inch closer to reality, experts are sweating over their potential to render many of today's cybersecurity technologies useless.

Got big data? Check out these 100 best practices for keeping it secure

Got big data? Check out these 100 best practices for keeping it secure

Big data is best known for its volume, variety and velocity -- collectively referred to as the "3 Vs" -- and all three of those traits make security an elusive goal. Targeting companies grappling with that challenge, the Cloud...

A new algorithm can hide messages in your favorite dance music

A new algorithm can hide messages in your favorite dance music

It's long been known that secret messages can be included in music through techniques such as backmasking, but now a Polish researcher has developed an entirely new approach.

Use the internet? This Linux flaw could open you up to attack

Use the internet? This Linux flaw could open you up to attack

A flaw in the Transmission Control Protocol (TCP) used by Linux since late 2012 poses a serious threat to internet users, whether or not they use Linux directly.

Adware turns a tidy profit for those who sneak it into downloads

Adware turns a tidy profit for those who sneak it into downloads

If you've ever downloaded software, chances are you've experienced an all-too-common surprise: ads or other unwanted programs that tagged along for the ride, only to pop up on your PC uninvited. Turns out there's a highly lucrative...

UK government hit with new complaint about hacking abroad

UK government hit with new complaint about hacking abroad

A group of privacy advocates and internet providers has filed a new challenge to the UK government's use of bulk hacking abroad.

The FBI is using outdated IT to foil FOIA requests, lawsuit alleges

The FBI is using outdated IT to foil FOIA requests, lawsuit alleges

The FBI is using antiquated computer systems to deliberately foil requests made under the U.S. Freedom of Information Act, a new lawsuit alleges.

Use Tor? Riffle promises to protect your privacy even better

Use Tor? Riffle promises to protect your privacy even better

Privacy-minded people have long relied on Tor for anonymity online, but a new system from MIT promises better protection and faster performance.

How big data is changing the game for backup and recovery

How big data is changing the game for backup and recovery

It's a well-known fact in the IT world: Change one part of the software stack, and there's a good chance you'll have to change another. For a shining example, look no further than big data.

Cost of a data breach: $4 million. Benefits of responding quickly: Priceless.

Cost of a data breach: $4 million. Benefits of responding quickly: Priceless.

The bad news is that data breaches are becoming ever more common. The worse news is that the cost they represent for companies is going through the roof.

Got privacy? If you use Twitter or a smartphone, maybe not so much

Got privacy? If you use Twitter or a smartphone, maybe not so much

The notion of online privacy has been greatly diminished in recent years, and just this week two new studies confirm what to many minds is already a dismal picture.

Load More