Topic:

Security

Latest Headlines

Latest Headlines

Marcus Ranum: 'We've failed at building system administration'

A security conference is generally where you'd expect the keynote speaker to present something called a "solution." At this one, one of the most recognized names in the field was left wanting one.

Spotlight: What the Ebola crisis can teach you about workflow management

"Workflow" sounds better than "itinerary," and that poetic lilt is important when trying to get your workforce on board with a tactical improvement program.

Security in the cloud era, such as it is

It was a small security conference, but I'll take it.  It gives me time to listen to people in their everyday work whose business is suffering from a lack of healthy communication.

Where's your latest network exploit? Check behind the coffee machine

The tech press often waxes poetic about the latest clever, automated, exploit "bot." But a veteran security engineer uses the oldest tricks in the book to prove you don't need bots to take down a network.

Bruce Schneier: NSA would rather eavesdrop than negotiate for bulk data

Already, people are happy to give away elements of their personal data to private industries for marketing purposes. Why does the U.S. Government bother with eavesdropping for the same data?

Dropbox's defense against password leak raises more questions than answers

Bloggers acting on public information do have a tendency to get the facts wrong. But Dropbox's effort to correct them, spearheaded by someone other than its PR team, pointed to some uglier facts.

Spotlight: What to consider before an EMM purchase

Larry Dignan,  ZDNet' s Editor-In-Chief, says enterprise mobility management is a thick soup of components that range from security to document management.

Sprint to partner with Ping Identity for mobile single sign-on

One of the main complaints about pre-loading business smartphones with mobile productivity apps has been addressed, with an option that moves authentication inside the corporate network.

Lessons learned from Xen cloud reboot: When users don't even know

If security bugs like last month's Xen hypervisor vulnerability continue to be mitigated with minimal damage, and disaster totally avoided, will there be anything left to panic about?

Spotlight: Is email sharing of cloud-based files really better?

It's obvious enough that the current system of attaching files to emails in such a way that they can only become accessible by  opening  them through the operating system has been dangerous for over a decade-and-a-half and has to be replaced.