SAN FRANCISCO--The Federal Bureau of Investigation plans to offer an unclassified version of its malware repository and analysis tool known as the Binary Analysis Characterization and Storage System to the private sector later this year, the agency's director, James Comey, told an RSA Conference audience last week.
There is no arguing that BYOD is here to stay. Employees will bring all types of new mobile devices to work, and they will use them in their day-to-day work no matter how great your concerns are. Guest post by Amtel's PJ Gupta.
Many companies are ignoring the security and privacy problems that can arise in their rush to harness big data.
The use of social media has exploded over the last few years. Facebook alone has more than 1.2 billion users. Social media is increasingly being used as an enterprise communication and marketing...
The latest wave of wearable mobile technology is on the market, and what's on the market will inevitably try to make its way inside the doors of the enterprise. Organizations that have, until now, had little interaction between the CIO shop and the legal department could soon find the carpet wearing thin between the offices.
At the CES International this year, BMW and Audi proudly demonstrated driveless cars that can steer, brake and throttle autonomously using sensors. What they failed to discuss was whether their driveless cars were vulnerable to hijacking by a hacker.
Yahoo led the way among high-tech U.S. firms in terms of national security data requests during the first half of 2013, according to data released by Yahoo, Apple, Facebook, Google and Microsoft.
A powerful EU commissioner is threatening to suspend the EU/US safe harbor agreement--which protects U.S. companies from EU regulatory action if they meet certain data protection criteria--unless significant changes are made to address privacy concerns raised by reports of widespread surveillance by the National Security Agency.
Apparently, there is a reason why the birds in the Angry Birds smartphone app are angry--they are being used as pawns in the National Security Agency's global surveillance dragnet, according to media reports citing documents from Edward Snowden.
Top news stories for Jan. 24, 2014.