Microsoft has unveiled the latest version of its Windows Embedded CE operating system-Windows Embedded Compact 2013-to help organizations capture the data of programmable logic controls and machine-human interface panels.
For the second year in a row, social media sites (including gaming and dating sites) are leading the way in consumer security and privacy protections, beating out Internet retailers and banks, according to an annual comprehensive audit by the Online Trust Alliance (OTA).
Your organization will come under attack. It's not a matter of "if." It's a matter of "when." And security is no longer simply an operational concern. As technology has become the central component of nearly all business processes, security has become a business concern. As a result, information security should sit firmly on the boardroom agenda.
"We are seeing about 150,000 new pieces of malware every day now," says Simon Hunt, vice president and CTO of Endpoint Solutions at security vendor McAfee. "The attack is just impossible and we're purely on the defensive. Before we know about any new virus, somebody has to be a sacrificial lamb and die and tell us about it. It's an awful way of doing things."
PayPal CISO Michael Barrett took the keynote stage at Interop to announce the impending death of passwords and their replacement with more robust authentication protocols based on an open standard. Apple may lead the way with its next iPhone.
Speaking at Interop today, Open Compute Project Chairman and President Frank Frankovsky announces plans for a new open source project to develop a specification and a reference box for an open, OS-agnostic switch.
Analysis of machine-generated data can play an important role in a sophisticated layered defense for your data and systems, but getting there can be challenging even with advanced intelligence platforms.
The Associated Press's Twitter account was hijacked this afternoon and used to tweet a false message that reported two explosions at the White House had left U.S. President Barack Obama injured. One security expert says the incident underscores the need to adopt out-of-band two-factor authentication and keystroke encryption.
Few things can keep CIOs up at night these days like mobility, particularly bring your own device (BYOD). After all, mobile, consumerization of IT and bring-your-own-device (BYOD) are turning enterprise security models on their heads. Privacy implications--let alone the potential for data loss and data leakage--are enough to make a CIO break out in a cold sweat.
It's no secret that Hewlett-Packard (HP) has been seeking a path to a turnaround. On Monday morning, HP President and CEO Meg Whitman unveiled a new vision for the company's server business that could be what the company's flagging fortunes need.
Mobility is a top-of-mind concern for a majority of IT departments today. Companies that are proactively embracing mobility to transform their businesses are incurring much greater costs associated with mobility incidents, but they are also reaping significant rewards, according to a new study by Symantec.
Trust. It is the basis of all digital transactions. We trust that our inventory systems are providing the correct information, that the documents we're reading have not been altered, that the entity on the other side of a financial transaction is our bank.
Responding to the increasing number of threats aimed at certificate authorities and the ecosystem of trusted online transactions they represent, seven certificate authorities have come together to form an advocacy group to advance security standards and promote best practices.
If there's one thing that's become clear in the past several years, according to PayPal CISO Michael Barrett, it's that usernames and passwords--originally conceived in the era of centralized mainframes--have become more of a liability than a protection online.
Are your former employees walking out the door with your intellectual property? And worse, is your new hire putting your organization at risk by bringing in IP stolen from a former employer? A new global survey by Symantec and The Ponemon Institute finds that half of employees who left or lost their jobs in the past 12 months kept confidential corporate data, and 40 percent say they plan to use the data in their new jobs.