Brian Krzanich demonstrated wearable device capabilities, and conflict-free microprocessors during his presentation … continue reading
Before storing your data in the cloud, know the kind and sensitivity of that data … continue reading
Organization working with members to create alternatives to passwords that strengthen Web security … continue reading
Major update to SharePoint provides improvements to performance, stability and security … continue reading
This process identifies and prioritizes risks before dealing with them, which should ease things for developers … continue reading
The breach occurred in a backup server, according to Adobe … continue reading
The breach was bigger than indicated, and for a while a portion of Photoshop’s code was freely available … continue reading
The maintenance that goes into public clouds makes them more reliable and harder to compromise … continue reading
It took the company two months to find (and admit to) the breach; stolen material included customer info and source code … continue reading
With a little patience, and a lot of high-resolution photos, laser printers and latex milk, criminals can crack your iPhone … continue reading
Companies that use Big Data products have to ensure security, or else; do not mistreat your open-source developers … continue reading
The problem lies in WebKit and involves using SMS texts or iMessages … continue reading