Search Results | Malware
PREV 1...30   40   50...66   67   68   69   70   71   72   73   74   75...76 NEXT
Sort by:  Most Relevant  |  Date
How mobile operators can bring the smart city to life

Blog  Can you relate to this? You find that one elusive parking spot -- and as you are backing up, another car sneaks in. A study conducted last month in the U.K. found that more than half of British drivers suffer from stress when they cannot find a parking space. Probably all drivers in major towns and ...

Last updated: Oct 31, 2017   6:49 PM GMT  |  Blog: IoT Agenda   |      GATEWAY, Gateways, Internet of Things
Seriously Cheap Computing with Linux

Blog  I'm getting ready to update my Linux computer to Ubuntu 12.1. And as I write this, Windows 8 crashes on me! This is not a joke. For real. It happens maybe once a week, which is better than most older versions of Windows. Linux has almost never crashed on me. I mean, maybe once a year over the past 1...

Last updated: Feb 21, 2013   7:29 PM GMT  |  Blog: Cheap Computing
Cybersecurity The local impact inside and out

Blog  The other day, in the article Cyberwar: A consideration for business protections?, we asked a few questions vis--vis cyberwarfare: Outside: What are the modern organizations possible contributions to surrounding outside public enablements and related security there? [Think: electrical ...

Last updated: Feb 12, 2013   4:35 PM GMT  |  Blog: The Business-Technology Weave
New Zealand vendor making next generation IDS a reality

Blog  Until now some experts have signaled the slow demise of intrusion defense systems, but one firm is having success in the government sector with an IDS appliance that can capture 100% of network traffic. In government circles, its the little, but powerful engine that could. New Zealand firm Enda...

Last updated: May 24, 2010   7:28 PM GMT  |  Blog: Security Bytes
Russian cyberwar! Yes, no, maybe so?

Blog  The specter of cyber-warfare has been looming over the Internet since its earliest days. Once people figured out that they could send malicious traffic to remote computers, it was only a matter of time before discussions turned to how this could be useful in the context of military operations. Given...

Last updated: Aug 13, 2008   3:26 PM GMT  |  Blog: Security Bytes
FBI launches Operation Bot Roast II

Blog  The FBI has just announced the results of its latest crackdown on botnet herders, designated Operation Bot Roast II. Since the first crackdown in June, eight people have been indicted, pleaded guilty or been sentenced for botnet crimes. Meanwhile, 13 search warrants were serve...

Last updated: Nov 29, 2007   8:41 PM GMT  |  Blog: Security Bytes
Fighting security FUD

Blog  I recently tripped over a blog write-up from independent analyst Eric Ogren about his irritation with security vendors using FUD to sell products. It's an older posting from 2006 but his message is as relevant today as it was two years ago. Building his case around a threat report Websense released...

Last updated: Apr 17, 2008   2:42 PM GMT  |  Blog: Security Bytes
Magic Quadrant for Network Access Control: Crowded, but leaders stand alone

Blog  Gartner's 2010 Magic Quadrant for network access control (NAC) is remarkably crowded for a market that reportedly generated just $200 million in annual revenue in 2009. Gartner has included 18 vendors in this year's quadrant. For many of these companies, NAC revenue is a drop in the bucket. For othe...

Last updated: Jul 16, 2010   9:49 PM GMT  |  Blog: The Network Hub
Shielding valuable IIoT data with VPNs

Blog  The growing use of IIoT worldwide is in the process of turning the concept of smart factories into reality. The phenomenon has been described by observers as the fourth industrial revolution, or Industry 4.0 for short. Industry 4.0 promises to combine digital technologies -- such as big data, data ...

Last updated: Jan 31, 2018   6:15 PM GMT  |  Blog: IoT Agenda   |      Data-security, IIoT, Internet of Things
The challenge of transatlantic data security

Blog  US companies that operate in the European Union (EU) need to understand what drives European organisations when it comes to data protection. This applies to both commercial organisations that want to trade in Europe and IT suppliers that need to ensure the messaging around their products and service...

Last updated: Feb 16, 2016   7:47 AM GMT  |  Blog: Quocirca Insights   |      European Union, GDPR, safe-harbour
The ever-growing IoT attack surface

Blog  The theme of a recent Infosecurity Europe 2017 Strategy Talk, facilitated by Quocirca, was how to limit the ability of hackers to exploit the expanding IT attack surface created by the deployment of increasing numbers of IoT (Internet of Things) devices. The two panellists, representing the security...

Last updated: Jul 6, 2017   7:56 AM GMT  |  Blog: Quocirca Insights
Five things to watch at RSA Conference 2017

Blog  RSA Conference 2017 officially kicks off Monday, and once again it will bring several topics, trends and potential controversies to the center of attention of the information security industry. Unlike previous RSA conferences, this year it's been harder to identify one or two major themes heading in...

Last updated: Feb 8, 2017   9:09 PM GMT  |  Blog: Security Bytes   |      iot security, Security
The importance of securing the internet of things

Blog  The continued growth of the internet of things and connected devices (Gartner predicts a total of 20.4 billion connected things in use worldwide by 2020) has resulted in an exponential growth in data -- with a promise to make appliances smarter, processes more efficient and life, in general, easier....

Last updated: Jul 30, 2018   8:25 PM GMT  |  Blog: IoT Agenda   |      Blockchain, Consumer IoT, Drones
Four reasons to involve IT in IoT

Blog  IoT endpoints have the potential to create tremendous business benefits -- if they're strategically deployed and managed. So, why are 59% of today's enterprise IoT initiatives being planned with little to no IT involvement? An IoT deployment that lacks IT involvement can jeopardize an organization'...

Last updated: Nov 29, 2018   5:10 PM GMT  |  Blog: IoT Agenda   |      automated attacks, cloud, Data
Drop.io: Free, online file sharing made simple, easy and anonymous

Blog  Do you need a simple way to post and share large files on the Web temporarily? Is sending an attachment over email a bad option, for whatever reason? You could try Amazon S3 or FileURLs, both of which offer the ability to transfer files around. You could use the tried and true method of posting to...

Last updated: May 28, 2008   7:10 PM GMT  |  Blog: Our Latest Discovery
Next-gen automotive cybersecurity with software-defined perimeter and blockchain

Blog  The emergence of autonomous vehicles is radically changing the automotive business. This change is bringing in new revenue generation opportunities for the whole industry, but with it, also new risks -- specifically cybersecurity. Since autonomous vehicles are completely dependent on connected softw...

Last updated: Dec 14, 2017   5:16 PM GMT  |  Blog: IoT Agenda   |      Blockchain, Connected car, Internet of Things
How to have a safe connected cyber summer

Blog  Summer means vacations and down time. People are booking hotels, arranging travel or settling in at the beach with the digital version of a summer novel. For many families, the kids are home from school and permanently wired in to an array of connected devices. So, along with the sunscreen and bug s...

Last updated: Jun 7, 2019   5:20 PM GMT  |  Blog: IoT Agenda   |      Internet of Things, iot, IoT cybersecurity
Social Networking and the Workplace

Blog   Increasingly I see articles about young employees lobbying managers and senior executives about using social networking sites for work-related activity. These sites generally comprise (perhaps compromise?) a mash of party pics, all manner of stream-of-consciousness ruminations, drunken esc...

Last updated: Jun 20, 2010   7:24 PM GMT  |  Blog: The Business-Technology Weave
Worth Considering: Paul Thurrott Praises the Win8 Desktop

Blog  There's a terrific piece over on Paul Thurrott's Supersite for Windows that posted yesterday, entitled "In Praise of the Windows 8 Desktop." In that story, he calls out all the new features on the old-fashioned but still extremely usable desktop in Windows 8 that deliver new or vastly improved funct...

Last updated: Mar 20, 2013   6:50 PM GMT  |  Blog: Windows Enterprise Desktop
Everything New is Old Again

Blog  Fifteen years ago, I had a little less weight around the middle, my hair was a slightly darker shade of brown, I had my first real suit ... and I was going to my first real job interviews. After four different interviews, two made serious offers: A computer operator for American Blind and Wallpap...

Last updated: Jun 1, 2012   11:00 AM GMT  |  Blog: Uncharted Waters
PREV 1...30   40   50...66   67   68   69   70   71   72   73   74   75...76 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: