Old Articles: <Older 3431-3440 Newer> |
|
IEEE Spectrum December 2012 Tam Harbert |
New King of Security Algorithms Crowned A five-year hunt for a new cryptographic hash scheme leads to the discovery that the old one was really good |
IEEE Spectrum December 2012 Ko et al. |
Understanding Cloud Failures An analysis of 172 incidents reveal new categories of problems |
National Defense December 2012 Emilio Iasiello |
Identifying Cyber-Attackers to Require High-Tech Sleuthing Skills The White House released in May 2011 the first "International Strategy for Cyberspace." This policy document promotes the U.S. vision for the future of the Internet and the nation's role in shaping that plan. |
CIO October 30, 2012 Lucian Constantin |
Lack of Abuse Detection Allows Cloud Computing Instances to Be Used Like Botnets, Study Says Some cloud providers don't detect attacks launched from their networks, researchers say |
CIO September 18, 2012 Jeff Vance |
Free Mobile Apps Put Your BYOD Strategies at Risk When it comes to the BYOD trend, CIOs worry over their lack of control of mobile apps. However, it's not only about rogue mobile apps packing malware that trouble them. IT leaders are also concerned by the risks posed by malware-free mobile apps. |
National Defense November 2012 Valerie Insinna |
States to Ramp Up Cybersecurity Information Sharing Cybersecurity has long been seen as a federal domain, but an initiative announced by the National Governors Association seeks to shift the discussion to the state level. |
Chemistry World October 10, 2012 Maria Burke |
Illegal medicines seized in worldwide operation During the nine-day operation, coordinated by INTERPOL and involving 100 countries, around 18,000 illegal online pharmacy websites were shut down and 79 people were arrested. |
CIO September 17, 2012 Tom Kaneshige |
CIOs Look Ahead: Millennials, Consumer Tech and the Future The newest wave of workers, known as Millennials, are demanding technology freedom and a blurring of the work-life line through social media and personal mobile devices. Here's how CIOs can give Millennials what they want without relinquishing control. |
IEEE Spectrum October 2012 Tam Harbert |
Internet Giants Adopt New Lobbying Tactics Google and Facebook are spending heavily on traditional lobbying firms, even as they marshal their users to influence the U.S. Congress |
IEEE Spectrum October 2012 Paul McFedries |
From Surf to Serf Digital sharecroppers, unite! Just like the farm laborers of old who worked the land but didn't own it, digital sharecroppers grow the product that earns Web 2.0 companies their profits, but they relinquish ownership. |
<Older 3431-3440 Newer> Return to current articles. |