Tony Bradley | @gettechspective PCWorld Apr 3, 2015 All malware is bad, but ransomware is particularly insidious—ask any ransomware victim. That's...
Posts
By Paul Rubens, Follow CIO | Apr 1, 2015 Many CIOs endanger their companies simply by not spending enough on...
By Ron LaPedis - Mar 19, 2015 6:16 AM PT ...IT people know the facts. For instance, they know that, in 2014,...
By Randy Ludlow The Columbus Dispatch • Thursday March 19, 2015 9:38 PM Kasich: State will replace Buckeye Lake dam...
Sharon Gaudin | @sgaudin Senior Reporter, Computerworld Mar 18, 2015 Google botched its wearable, Google Glass, and now the director...
CONTINGENCY PLANNING GUIDE FOR INFORMATION TECHNOLOGY SYSTEMS Elizabeth B. Lennon (Editor) Information Technology Laboratory National Institute of Standards and Technology...
Jeremy Kirk IDG News Service Mar 13, 2015 A Google software problem inadvertently exposed the names, addresses, email addresses and...
Joab Jackson IDG News Service Mar 10, 2015 With the latest Patch Tuesday release, Microsoft is fixing the FREAK vulnerability...
By Joe Schreiber - solutions architect at AlienVault 6th March 2015 Getting breached doesn’t establish whether or not you have...
By Steve Johnson SAN JOSE (CALIF.) MERCURY NEWS Monday March 9, 2015 8:56 The breakneck pace of this technology has...