Security features that Apple Inc. added to Leopard look great on paper, but in practice most are half-baked or useless, experts said today. And none of those features, good or bad, will make a whit of ...
New cybersecurity standards proposed by the North American Electric Reliability Corp. (NERC) to protect the nation’s power infrastructure are not broad enough and fail to cover a significant number of ...
Every security system, in the end, depends on people. Ideally, programs could be written with restricted privileges for operators so they would pose no threat – but I doubt it would work in practice.
Microsoft will launch Windows 11 on October 5, but not every PC will be eligible for an immediate upgrade. Rollout will last well into 2022 for machines that meet the necessary hardware requirements, ...
How much do cyberattacks cost? Recently, we reported on Clorox suing Cognizant for $380 million over alleged helpdesk failures during a cyberattack. We described how the complaint, filed in a ...
CryptoPhone users found 17 fake “cell towers” in a month, but don’t know who deployed them or why. If you think you'd know if your calls are being intercepted by seeing the phone connect to "2G," then ...
We meet Ian Mountford, a governance, risk and compliance consultant who transitioned into cyber security late in his career after being the victim of a hack. Ian talks about his rich and varied career ...
What are the current dangers in mobile technology and what are the strategies to keep yourself protected? Join host Steve Ragan from the show floor at RSA 2018, where he talks with Will LaSala, ...
Author and philosopher Aldous Huxley once wrote, “The means determine the ends.” In other words, how we do something directly impacts the result. This is especially true when implementing security and ...