Your router: Gateway for hackers
It is generally accepted in IT that the weakest link in the security chain is the fallible and frequently careless human.
Taylor Armerding | 15 Aug | Read more
It is generally accepted in IT that the weakest link in the security chain is the fallible and frequently careless human.
Taylor Armerding | 15 Aug | Read more
After last week's column on Apple's built-in firewall, Frank Lowney asked the following question in the column's comments section:
Jeffery Battersby | 02 Jul | Read more
On Tuesday, researchers from Skycure disclosed at the RSA conference that a previously known iOS flaw related to automatic Wi-Fi network connection and a newly discovered SSL certificate handling error could cause an iPhone or iPad to crash and endlessly reboot as long as it remains within range of the network. (Skycure sells monitoring and mitigation systems.)
Glenn Fleishman | 24 Apr | Read more
Nearly all the fancy hardware in your connected home is inherently flawed when it comes to security. That's one of the painful takeaways from a new report by Synack, a subscription Security-as-as-Service (SaaS) startup in Menlo Park, California. The company's analysis will be a rude awakening for anyone who thinks they have a bullet-proof home-security system, whether it's a DIY project or a pricey custom job.
Paul Lilly | 14 Feb | Read more
Roundtable Attendees:
Chee-Sing Chan | 03 Jun | Read more
Given the current prevalence of mobile devices, especially smartphones, it comes as no surprise that they are becoming more and more entwined with everyday aspects of our lives. We don't just use them to make calls, to text, or to browse the internet anymore. We can use them to do just about anything, and that includes using them as a means to provide our credentials.
Grant Hatchimonji | 03 Jun | Read more
If media reports and technology vendors are to be believed, then the world of artificial intelligence, smart cities, and a life of automated-everything is just around the corner. The surge of hype around the Internet of Things (IoT) has stolen the thunder of big data and cloud, the last two technology trends dominating headlines.
Chee-Sing Chan | 30 May | Read more
Rogue cloud services are ripping gaping holes in the security fabric of most companies, putting the CIO in a tough spot. But as the fallout from the Target attack shows, IT and business leaders will go down together if the breach hits the fan.
Tom Kaneshige | 10 May | Read more
Microsoft may be prepping to ship a mini version of its Surface tablets within a month, based on an Amazon.com listing for a case custom made for the device.
Tim Greene | 25 Apr | Read more
That someone had to take the fall for the massive breach at Target is neither surprising nor unexpected. The only question is whether more heads will roll in the aftermath of one the biggest data compromises in retail history.
Jaikumar Vijayan | 05 Mar | Read more
, the open source software management company, picks the top 10 open source projects launched in the past year, based on stats collected from the
Black Duck | 28 Jan | Read more
Going into 2014, a whirlwind of security start-ups are looking to have an impact on the enterprise world. Most of these new ventures are focused on securing data in the cloud and on mobile devices. Santa Clara, California-based Illumio, for example, founded earlier this year, is only hinting about what it will be doing in cloud security. But already it's the darling of Silicon Valley investors, pulling in over $42 million from backer Andreesen Horowitz, General Catalyst, Formation 8 and others.
Ellen Messmer | 13 Nov | Read more
The enterprise has gone mobile and there's no turning back. And while the BYOD movement has received plenty of attention, IT departments are getting a handle on the security risks of personal mobile devices in the workplace. The next challenge is "bring your own application" (BYOA), because many public app stores have serious malware problems.
Michelle Drolet, founder of Towerwall | 20 Jun | Read more
A router is the heart of your network, so it deserves to be chosen carefully. Any router will share your Internet connection amongst your computers and other networkable devices (smartphones, tablets, and so on), but better models provide features that will enhance your network and its performance. Whether you're seeking a business- or consumer-class router, here are the eight most essential features to look for.
Eric Geier | 17 May | Read more
In the IDG Enterprise Interview Series, you'll hear from technology CIOs and CEOs on today's burgeoning trends, ongoing headaches and upcoming product plans. Check out this informative series from IDG Enterprise Chief Content Officer John Gallant and his team of editors.