The FBI is helping Arkansas prosecutors break into an iPhone and iPad looking for evidence in a murder trial, and it’s without asking Apple for help. Read More ▶ |
|
| White Paper: CommVault This paper explores why the cloud is well suited for disaster recovery and what organizations need to consider to ensure that cloud DR is right for them. Read More ▶ | The blockchain is now being hyped as the solution to all inefficient information processing systems, such as recording of property transfers, escrow services, and even legal contracts, but there are both security benefits and challenges to the technology Read More ▶ |
| Verizon Enterprise, a bulwark against cyberattacks at many large organizations, has suffered a security breach itself. Read More ▶ |
| In the first quarter of 2016, more than three dozen businesses have been victimized by Phishing attacks targeting employee tax records. The scams have impacted organizations both large and small, playing on fear and basic human nature in order to succeed. Read More ▶ |
| | The U.S. government says seven Iranians working for the country's Islamic Revolutionary Guard Corps are responsible for 187 denial of service attacks aimed at banks across the U.S. from 2011 to 2013. Read More ▶ |
| Earlier this month, the White House released a draft of an open source code policy for public review which would require agencies to share code with each other and with the public, but some experts are concerned about possible security implications. Read More ▶ |
| A Trojan program is being distributed through USB drives and seems to be designed for stealing information from so-called air-gapped computers that are not connected to the Internet. Read More ▶ |
| White Paper: CommVault This paper examines five easy ways to overcome concerns about managing increased data flows, and moving operations to the cloud and offers solutions to each concern. Read More ▶ | Editor's Picks |
|
|
|