Security | News, how-tos, features, reviews, and videos
The US SEC is content with a trade-tracking system that provides data on stock trades the day after they happen, something no broker would put up with. CIO.com blogger Constantine von Hoffman says a real-time version will soon be available, but it wo
IT and security professionals are increasingly concerned about targeted malware and data breaches. What's worse is that their confidence in their ability to identify and stop them is waning.
The U.S. military chose not to use any sort of financial-management software to track money it spent in Iraq. Thanks to a report from auditors and investigators, the government now has some idea of where all that cash went. But the report does not pa
Hardly a day goes by without a new security threat emerging. Traditional security tools aren't always up to the task of keeping sensitive business information in safe hands. These six innovations will help you stay a step ahead.
Cyberattacks donu2019t always trip the sensors, alerts, and level of traffic set by network security. In reality, your most dangerous cyberattackers are likely to be operating under your radar.rn
iPads have become a staple in many factories, but cost-conscious plant managers are opening up to cheaper, and increasingly popular, Android tablets.
Traditional BI requires human input to decide what correlated factors to query. As predictive data analytics gets increasingly powerful, the algorithms do the deciding. That spells the end of BI as CIO.com columnist Bernard Golden knows it--and he do
Police around the world asked Microsoft for user data stored in the cloud 76,000 times in 2012. And most of the time, they got it.
Cyber threats from larger, more advanced nations that have diplomatic relations with the United States focus on cyber espionage and theft. But Iran is a more irrational actor and is building a cyber capability that is retaliatory in nature.
Reports suggest the United Kingdom rejected BlackBerry 10 for secure government use, but BlackBerry denies the claims and says the approval process is just taking longer than expected.
As House subcommittee weighs overhaul of 1986 statute to strengthen privacy in the cloud, senators introduce their own legislation to update Electronic Communications Privacy Act. Department of Justice affirms the Obama administration's support
Sponsored Links