Security
Linux Effort Targets Secure Code Development
As software bugs, vulnerabilities and other security gaps lead to a seemingly endless string of high-profile breaches, the Linux Foundation is expanding an infrastructure initiative to include a certification ...Full Article
How to Mitigate Third-Party Data Breach Risks
University of Pittsburg Medical Center (UPMC) is one of the latest healthcare organizations to have sensitive records exposed. This breach should trigger a wake-up call for healthcare organizations -- ...Full Article
MOOCs Teach IT Lessons Before Summer Ends
As full-time students' thoughts return to classrooms and lesson plans, IT professionals will find a slew of new online educational offerings designed to augment and expand their skills. An ...Full Article
Hardware: A Building Block for IoT Security
For all its promise, the Internet of Things packs a lot of fears. Most recently, of course, two hackers completely immobilized a Jeep Cherokee as a driver headed down ...Full Article
Audit Your Cloud for Security and Savings
By auditing their organizations' cloud implementations, IT departments can rein in security risks, curtail costs, improve end-user services, and enhance relationships with departments. Once IT professionals know the extent ...Full Article
Conservative Bank Treads Softly Into Cloud
As head of infrastructure at DZ BANK, Dr. Jan Vitt is cautiously leading the conservative German financial institution's investment into cloud. Germany, after all, has some of the most stringent privacy ...Full Article
Manta Beats Bots with Automated Protection
As a destination site where about 30 million small and midsize companies market themselves to each other and consumers, Manta is attractive to another form of traffic: web scrapers ...Full Article
NSA Contributes Security Tools For Puppet
IT automation specialist Puppet Labs has announced a new partner: The U.S. National Security Agency. Puppet Labs said Friday (June 19) that NSA is releasing to the open source ...Full Article
Red Hat Survey Highlights Container Certification
Production deployment of Linux application containers may not be meeting expectations, but there is no shortage of industry surveys attempting to pinpoint barriers to adoption. The latest released on ...Full Article
Slam the Door Against Insider Threats
When a banker falls behind on the mortgage, a physician gets arrested for driving under the influence, or a contractor is working on a sensitive federal construction site under ...Full Article