You Need to Get Creative With Pen Testing. Here’s How to Do It.
Security professionals have long been running penetration tests against their firewalls and other security systems to find weaknesses that need to be addressed. The Common…
Forgotten risks hide in legacy systems
Cover story These days, there’s no shortage of new business technologies and new threat vectors to the enterprise. But what many companies forget is that…
Taxman Cometh
Experts say paying taxes on virtual currencies is only a matter of time
Info sec industry still struggles to attract women
Even as women have made dramatic advances in medicine, law, and other fields, the proportion of women pursuing undergraduate degrees in the computer sciences has…
Get Proactive: Finance professionals are putting big data tools to use to drive revenue
Finance professionals are putting big data tools to use to drive revenue Online job search site TheLadders matches senior-level professionals with high-paying jobs, and the…
10 big myths about Big Data
Big Data has dominated tech news of late. It has been touted as a possible solution for everything from intrusion detection to fraud prevention to…
Bitcoin of the Realm: Overstock.com Accepts Virtual Currency
Overstock.com, the second-largest online retailer in the U.S., has begun accepting Bitcoin as payment for all purchases. “Bitcoin’s first full day on @overstock.com was a…
Beginning of the End
Merchants are starting to accept Bitcoin–overcoming challenges and earning new customers in the process In 2013, Bitcoin was primarily known for its use in nefarious…
Ubuntu 13.10: The good, the bad and the ugly
New Touch operating system for mobile devices is still a work in progress The newest release of Ubuntu, dubbed Saucy Salamander, doesn’t offer much in…
Don’t click on these links
Whether you receive a phishing email inviting you to click on a specific link, whether you see the link on your trusted social media sites,…
How to stay one step ahead of phishing attacks
Phishers are upping their game, so end users need to respond accordingly Protecting yourself against phishing attacks used to be relatively easy. Don’t download unexpected…
Is open source encryption the answer to NSA snooping?
When Unisys CISO John Frymier came in to work on Friday, Sept. 6, the phones were ringing, and continued to ring all day. Customers were…
App Stores Help Simplify IT Decision Making
I remember years ago helping someone choose a computer platform. “Walk into a computer store, and look at the software titles,” I suggested. “If the…
10 reasons to take a Chromebook on the road
If you’re trying to decide which device to buy for your next trip because your current laptop is too old, too slow, too heavy and…
10 reasons to take a Chromebook on the road
If you’re trying to decide which device to buy for your next trip because your current laptop is too old, too slow, too heavy and…
SaaS vendors, customers, finding new ways to secure the cloud
Rogue employees, hackers, government employees all threats to keeping information stored on the cloud private Edward Snowden’s leaks about NSA spying may have brought the…
10 encryption tips for the enterprise
Whether you’re protecting corporate data from internal leakers, hackers looking to steal money from you and your customers, foreign spies, your own government, or employees…
Fedora adds 3D printing support
Latest version of open source desktop boast several key improvements, but many usability issues remain The latest version of Fedora, nicknamed “Schrodinger’s Cat,” features a…
Security Keys
What treasury and finance executives need to know about encryption Treasury and finance executives need to know enough about encryption and security to ensure that…
15 most powerful Big Data companies
The world of big data vendors is divided into two camps. There are the pure-play Big Data startups who are bringing innovation and buzz to…
Telecommuting from paradise
Nine years ago, Francie Tanner was working at a technology consulting company in Dallas. Today, she lives in Anguilla with her family and works as…
Telecommuting from paradise
Nine years ago, Francie Tanner was working at a technology consulting company in Dallas. Today, she lives in Anguilla with her family and works as…
Rating the paradise destinations
What a life, sitting in your beach chair soaking up the sun while working on your laptop. Your main concern is what spf to use…
Telecommuting from paradise
With the right boss and the right broadband, these tech workers relocated to paradise destinations Nine years ago, Francie Tanner was working at a technology…
Big Data jumps to the cloud
Big Data-as-a-Service offers quick, inexpensive, targeted analytics Kevin Walker’s sales team was buried under information. Internal records, news reports, third-party data sources. Take a simple…
Virtual Reality
New virtual currencies a risky bet for corporations Virtual currencies have been in the news lately, with Bitcoin in particular gaining attention from an influx…
10 things we love about Ubuntu 13/5 things we hate
The latest version of Ubuntu, Raring Ringtail, is billed as being business and user-friendly. There are still obstacles to its widespread adoption in the enterprise,…
Ubuntu 13 challenges Windows 8
Ubuntu is becoming a viable desktop replacement for Windows in certain enterprise scenarios The latest version of Ubuntu, Raring Ringtail, is billed as business and…
Ubuntu 13 challenges Windows 8
Ubuntu is becoming a viable desktop replacement for Windows in certain enterprise scenarios The latest version of Ubuntu, Raring Ringtail, is billed as business and…
Ubuntu 13 challenges Windows 8
Ubuntu is becoming a viable desktop replacement for Windows in certain enterprise scenarios The latest version of Ubuntu, Raring Ringtail, is billed as business and…