IT security
See the following -
5 Things Every Organization Can Learn From Anonymous
You may find them annoying. You may find them threatening. But there’s no denying that Anonymous is still one of the most prevalent, powerful and decentralized movements out there...The movement’s ability to survive speaks to the power of leaderless groups, crowd sourcing and spontaneity. Here are 5 ways that traditional organizations — from companies, to start-ups, to charities — can learn from the mysterious power of hacktivists and internet trolls in Anonymous...
- Login to post comments
Big Cyber Hack Of Health Records Is 'Only A Matter Of Time'
The health world is flirting with disaster, say the experts who monitor crime in cyberspace. A hack that exposes the medical and financial records of tens of thousands of patients is coming, they say — it’s only a matter of when...
- Login to post comments
NIST Proposes New Set Of Guidelines For ‘Building Trustworthy Resilient Systems’
The National Institute of Standards and Technology (NIST) has released a draft set of new guidelines aimed at developing and improving security of critical systems and software.
- Login to post comments
NIST's Dream: Integrating Security Into Design
The National Institute of Standards and Technology hopes its new guidelines for IT security will beget a systems engineering process in which security is intrinsic to product design rather than an afterthought. The guidelines, posted May 12, offer best practices for information systems security based on international engineering standards...
- Login to post comments
Public sector in U.K. embracing open source
The [UK's] public sector is finally beginning to understand the security arguments for using open source software, according to experts participating in V3's Security Summit.
- Login to post comments
Virus Nails Hospital, Causes Massive Data Breach
No hospital is too small, evidently, to serve as fodder for hackers. The latest hospital cyber-attack is reported by a small-town rural hospital in Colorado. The hospital discovered it had a computer virus that had collected and encrypted patient data in a hidden file system.
- Login to post comments