Black Hat 2015

Oracle headquarters

Oracle’s monster update emphasizes flaws in critical business applications

Oracle hasn’t been “just” a database company in a long time, and nowhere is that more evident than in its quarterly critical patch update release, where the bulk of the fixes are in business applications like PeopleSoft and E-Business...

disaster recovery plan ts

7 things your IT disaster recovery plan should cover

Enterprise networks and data access can be knocked out without warning, thanks to natural and man-made disasters. You can’t stop them all from happening, of course, but with a good disaster recovery plan you can be better prepared for...

mobile device management

Is your cellphone number just as valuable as your social security number?

Recent news coverage has touted that cell phone numbers are just as valuable to hackers and identity thieves as Social Security Numbers. But, that's not the case at all.

ipad at the beach

Great big list of cybersecurity resources

Beef up your cybersecurity knowledge with this list of cybersecurity resources, including data threats, data breaches, books, jobs, companies and VC funding.

Keyboard
video

Tech Talk: The latest on Azure Stack, cyberattacks, the next iPhone and ... keyboards

Get the details on Microsoft's new Azure Stack, why cyberattacks never seem to end, the fate of Apple's Touch ID and why QWERTY keyboards are now tech relics.

messaging apps threats security privacy thought bubbles

Can Shakespeare solve our messaging app crisis?

The messaging app Telegram announced earlier this week it was stepping up its efforts to thwart terrorism communication. A college literature professor may have the perfect solution for the problem.

Anonymized identity

The thorny issue of verifying humans

Customer identity access management and how verification of users is not working. A look at the concept of levels of assurance (LOA) as an integer based system that needs a rethink. How probability based identity is the way forward....

negotiating contracts ts

Know the 'real' price of vendor contracts

Although many vendor engagements result in close working relationships, the age of predatory vendors is upon us. What can you do to avoid them?

The dark web goes corporate

It's just as shady and dangerous as ever, but something has changed in the way the dark web does business, and it will look very familiar to IT buyers.

construction building crane architecture

How to write an information security architect job description

A good information security architect straddles the business and technical worlds. Writing a solid, clear job description ensures that both sides understand the role.

fbi seal in sioc

Scammers demand Bitcoin in DDoS extortion scheme, deliver empty threats

The FBI has issued an advisory to businesses over a recent string of DDoS extortion attempts. The perpetrators are claiming to be affiliated with Anonymous or Lizard Squad, and their demands threaten sustained attacks unless a Bitcoin...

segway minipro

Hackers can remotely control, hijack a Segway MiniPro hoverboard

Leading up to the Black Hat conference, IOActive shows how a Segway Ninebot MiniPro hoverboard can be hijacked.

umbrella businessman protection stormy dark insurance

Are your corporate cyber defenses adequate?

Most of the organizations I speak with are talking about cyber-risk these days, and for good reason. Unfortunately, many of them are doing a lot more talking than actually doing. Some of this is human nature – threats are “somebody...

echo discount

Get $100 off Amazon Echo When You Buy 2 Right Now - Deal Alert

Put 2 Echo devices in your cart and Amazon will credit you back $100 right now. But you'll have to use a special code at checkout.

pixabay cybersecurity stock

Security and education in the wake of WannaCry, Petya

To prevent from becoming victims of cyber attacks like WannaCry, enterprises should regularly back up data, patch software and use automated security services.

Cloud Security

Top cloud security controls you should be using

Human error is one of the top reasons for data breaches in the cloud, as administrators forget to turn on basic security controls. Whether it is Amazon Web Services, Microsoft Azure, or Google Cloud Platform, keep these rules in mind...

Cloud_Security
video

Who's responsible for cloud security? | Tech Talk Ep 1

IDG editors talk about the common misperceptions about public cloud storage, including who's ultimately responsible for data security.

alert hacking threat detected

Hacker allegedly stole $7.4 million worth of Ether in 3 minutes

A hacker allegedly stole $7.4 million worth of the cryptocurrency Ether in three minutes during CoinDash's Token Sale.

Load More