it security

  • Hacking The Bottom Line

    Hacking The Bottom Line

    Where is your data, and how quickly can you safely reach it? These questions are top of mind now that cloud and mobile apps like Dropbox, Google Apps, iCloud and mobile banking apps pervade our everyday lives at home and at work. By 2020, there will be an estimated 6.5 connected devices per person. And as more devices—from baby monitors to cars and pacemakers—get Internet… Read More

  • Former Orbitz Security Chief Lands $5.25M For Risk I/O, A “Vulnerability Intelligence” Platform

    Former Orbitz Security Chief Lands $5.25M For Risk I/O, A “Vulnerability Intelligence” Platform

    As Kaspersky Labs details in its latest State of the Union, the threats to the IT landscape are changing, as security teams now have to juggle threats coming from both new geographies and platforms — on top of vulnerabilities caused by the usual suspects, like malware, spam and cybercrime. As such, IT teams now monitor vulnerability data from a host of sources and tools, which can be… Read More

  • NTT develops anti-Tempest device to improve computer security

    NTT develops anti-Tempest device to improve computer security

    All computer screens emit electromagnetic waves that can be intercepted by criminals who then use the data to reconstruct what is displayed. Research on the topic is largely classified. But it’s not a secret that even distances of 100 meters and more between the attacker and the target PC can still be critical, depending on the equipment used and the surrounding area (walls, large… Read More