- Welcome Guest
- Sign In
Box is working with Amazon Web Services and Gemalto to bring to market the solution, called "Box Enterprise Key Management," and give its most security-minded customers total control over the keys used to encrypt data they store on Box. "Industries like finance, government, legal and healthcare are ...
Just how close is 'too close for comfort' in the unprecedented connectivity of people, products and electronic communication that lies ahead with the Internet of Things? Should the providers of electronic devices be allowed to know when you set your house thermometer, or how often and how long you g...
The future explosion in e-commerce connectivity of all manner of electronic devices, sensors, and consumer products -- known as the Internet of Things -- will pose a major challenge to ensure that IoT data is secure and that personal privacy is protected. The global "installed and connected base" of...
Since 2010, when it began paying security researchers to find flaws in its programs, Google has paid more than US$4 million to bug hunters. Now it's prepared to pay even more. The company announced Friday that it's expanding its Security Rewards Programs to include payments to researchers before th...
Despite several highly publicized cloud hacks last year -- including the iCloud and Sony breaches -- the demand for cloud services is skyrocketing. Amazon Web Services grabbed 30 percent of the global cloud infrastructure service market in Q4, Synergy Research reports. AWS grew 51 percent year over ...
A group of organizations representing American businesses last week requested urgent discussion and dialog with China's government. They expressed concern about the possible adoption of a policy to ensure that any Internet and information communications technology products Chinese banks purchase fro...
Amazon on Wednesday announced WorkMail, a play for the enterprise email market. Offered by Amazon Web Services, WorkMail is aimed at companies that want to move their on-premises email services to the cloud. WorkMail reduces complexity and cost, Amazon said. With all mail infrastructure relocated to...
"No foreign nation, no hacker, should be able to shut down our networks, steal our trade secrets, or invade the privacy of American families," President Barack Obama told the U.S. Congress during the State of the Union Address last week. However, hunting down the perpetrators of cyberattacks that co...
Coinbase on Monday launched Coinbase Exchange, the first regulated bitcoin exchange in the U.S. The firm raised $75 million last week in a round of funding from new backers including DFJ Growth and BBVA Ventures, as well as existing investors Andreessen Horowitz, Union Square Ventures and Ribbit Cap...
Google reportedly is planning to set up shop as an MVNO, purchasing bandwidth from Sprint and T-Mobile in order to offer its own wireless service. Details are sparse, but Sprint is said to be putting a volume trigger into its contract that would allow for renegotiation if Google's customer volume sh...
As members of the U.S. Congress started to prepare for the upcoming legislative session, President Obama lost little time in putting cybersecurity near the top of a to-do list for lawmakers. During a visit to the federal National Cybersecurity Communications Integration Center, Obama called for addi...
Millions of Net surfers use obvious passwords to log on to websites, but their numbers appear to be declining. SplashData on Tuesday published its annual list of the top 25 most common -- thus worst -- passwords leaked online. No. 1 was "123456," followed by "password" and "12345." Both "123456" and...
IBM launched its newest mainframe, the z13, last week in New York City. Built for the mobile economy, the z13 can process 2.5 billion transactions daily. It enables real-time encryption on all mobile transactions at scale, and it includes embedded analytics that provide real-time transactions faster...
A fledgling website created last fall connects hackers with clients willing to pay for their services. Nearly 50 hackers have listed their services on Hacker's List so far, for tasks including data recovery, penetration testing and computer forensics. More than 500 hacking jobs reportedly had been o...
Verizon advertising partner Turn is using the carrier's Unique Identifier Header, or UIDH, to maintain tracking cookies on smartphones even after privacy-minded users have deleted them, Jonathan Mayer, a computer scientist and lawyer at Stanford University, reported this week. Turn shares the cookie...
Social Media
See all Social Media