Widgetized Section

Go to Admin » Appearance » Widgets » and move Gabfire Widget: Social into that MastheadOverlay zone

Home » Archives by category » ECONOMICS » Tech

Businesses competitive advantage is having successful cyber security actions.

Businesses competitive advantage is having successful cyber security actions.

In an environment where companies have to compete on a global scale, is important having an experienced staff to address technology security concerns and be able to act proactively to emerging…

New Cloud security tools.

New Cloud security tools.

In the case of cloud computing, companies are realizing that trying to force fit the old security measures  into the new isn’t working; this leaves holes in visibility and protection,…

Interview w/former NSA Director, General Keith Alexander, on cyber terrorism and his IronNet

Interview w/former NSA Director, General Keith Alexander, on cyber terrorism  and his IronNet

Former NSA Director General Keith Alexander engage here in a wide-ranging discussion on these topics, covering terrorism, cyber threats, and network security. After leading the National Security Agency (NSA) for…

High-tech surveillance systems increasing to the stratosphere.

High-tech surveillance systems increasing to the stratosphere.

Times are getting tougher for criminals, thanks to technological advancements in public safety. Public spaces today are protected by high-tech surveillance systems, ranging from security cameras to gunshot detectors that…

New Gartner report on CASB evaluation criteria.

New Gartner report on CASB evaluation criteria.

As cloud adoption expands in the enterprise, IT leaders are finding that the visibility and control capabilities that help them secure data in cloud services vary widely from cloud service…

70 % of Internet traffic worldwide travels through Northern Virginia.

70 % of Internet traffic worldwide travels through Northern Virginia.

Once in a while—not quite often enough to be a crisis, but just often enough to be a trope—people in the United States will freak out because a huge number…

U.S. Senate passed Cybersecurity Information Sharing Act – CISA bill.

U.S. Senate passed Cybersecurity Information Sharing Act – CISA bill.

Senate votes in favor of bill critics including Edward Snowden say will allow the government to collect sensitive personal data unchecked. Robyn Greene of the New America Foundation characterized the…

PWC & Cybersecurity : The Global State of Information Security® Survey 2016

PWC & Cybersecurity :  The Global State of Information Security® Survey 2016

Outlook is positive in the increasing participation of Boards in the overall security strategy. The Global State of Information Security® Survey 2016 Turnaround and transformation in cybersecurity. Download free full…

Neglect is biggest threat in cyber corporate data.

Neglect is biggest threat in cyber corporate data.

Today, neglect is actually one of the biggest threats to corporate data. According to the 2015 Cyber Risk Report from HP Security Research, all nine of the most dangerous enterprise…

IARPA´s searching new tech to collect information.

IARPA´s searching new tech to collect information.

As the House deliberates on measures to end the National Security Agency’s bulk data collection, intelligence community researchers are searching for new ways to collect more relevant information and less bulk.   Emerging tech agency the Intelligence…

Page 1 of 9123Next ›Last »