It’s been an incendiary week in IT, and in some cases we mean that literally. Fires of all kinds are raging at Facebook, Apple, Dropbox and Samsung. Read all about it in our tech roundup.
Read post
Cybercriminals are moving beyond mere hacking to extort money from their victims. Paying up, however, could be a big mistake
Read post
The best technology works so well you barely notice it. Cyber-criminals, however, don’t miss a thing.
Read post
An event at Toronto Region Board of Trade focuses on how best to protect corporate data amid a growing list of potential threats
Read post
Today’s hackers are sophisticated, and it’s becoming harder for organizations to stay one step ahead of attacks. This is why SearchSecurity.com has created an Essential Guide to dealing with advanced threats. The guide explains which threats are changing the fastest and offers advice on how to...
Read post
Today’s IP news roundup highlights some of the latest headlines in cloud computing, network security and more:
A study by SkyHigh Networks revealed that IT departments are blocking low-risk cloud services 40% more than high-risk services. The study of 300 organizations found that IT...
Read post
There’s always been a tension between the power of channels that convey information and the cost associated with them. But what if technology allows that tension to disappear?
Read post
Today’s IP news roundup highlights some of the latest headlines in IT jobs, big data, network security and more: Forbes.com and Dice.com recently revealed the top ten most in-demand cloud computing skills. Recruiters are currently looking for applicants with experience in Linux, Chef, shell...
Read post
Today’s IP news roundup highlights some of the latest headlines in big data, network security and more:
To help meet the need for qualified data scientists, the Institute for Operations Research and the Management Sciences (INFORMS) has launched a Certified Analytics Professional (CAP)...
Read post
If your network has gaping holes that make it easy for hackers to target your organization, then it’s time to get schooled. Head on over to SearchSecurity’s Data Protection Security School and check out Michael Cobb’s course on database security. The course includes a webcast on the...
Read post
A sergeant with Ottawa’s high-tech crimes unit explains the limits of what law enforcement officials can do to contend with IT security issues, and why DDoS attackers won’t give up easily
Read post
Financial institutions face two major cyber threats – DDoS attacks and advanced persistent threats. This article outlines why these threats are dangerous and what you must do to protect your data
Read post
Today’s IP news roundup highlights some of the latest headlines in VoIP, unified communications and more:
Infonetics Research revealed that the global VoIP market is expected to rise from $63 billion in 2012 to $82.7 billion by 2017. Their latest “VoIP and UC Services and...
Read post
From phone phreaks to credit card sniffers, hacking has come a long way
Read post
A CTO explains why most organizations are only managing to catch the lower-level hackers, and why more advanced skills will become an obvious need in 2013.
Read post
An Arbor Networks security researcher talks about how ‘hacktivists’ are showing IT departments they’re systems are not as iron-clad as they may think
Read post
In this 3-part series, expertIP is exploring the good, the bad and the ugly of network security. This time, we look at a handful of hackers and threats that have crippled organizations everywhere
Read post
Highlights from the annual security confab, plus: Time magazine covers big data, business continuity in India and more
Read post