A database described by some as a “terrorism blacklist” has fallen into the hands of a white-hat hacker who may decide to leak it online. Read More ▶ |
|
| White Paper: HyTrust No longer a toothless tiger, with larger fines and stricter enforcement, HIPAA now has teeth. The good news is that even in virtual and cloud environments, there are concrete steps you can take to maintain compliance. Read More ▶ | A Google security researcher has found high severity vulnerabilities in enterprise and consumer products from antivirus vendor Symantec that could be easily be exploited by hackers to take control of computers. Read More ▶ |
| The American Civil Liberties Union has filed a lawsuit challenging a 30-year-old hacking crimes law, with the civil liberties group saying the law inhibits research about online discrimination. Read More ▶ |
| Friday marks the start of the Fourth of July weekend for most of us, but two West Point cadets have much more to celebrate as their Vidder internships come to a close Read More ▶ |
| | In the wake of cyberattacks, it’s tempting to make a rush to judgment or approach the breach with preconceived notions. But incident response security teams need to keep clear heads to trace the attack’s origins or they risk making bad situations much worse. Read More ▶ |
| Research/Infographic: IBM Corporation An infographic highlighting the key points of Saugatuck Technology's research, which studied the importance of sourcing in hybrid IT environments. Read More ▶ | Top 5 Stories | Editor's Picks |
|
|
|