Start-up CrowdStrike today made available its first product, called Falcon, designed to detect and block stealthy infiltrations of Microsoft Windows or Apple Macintosh-based endpoint machines and servers.
Security monitoring — the type involving traditional security information and event management (SIEM) — can be done in some public cloud environments, according to Gartner. And if you’re using public cloud services, it’s time to think about doing it.
Adm. Mike Mullen, U.S. Navy (retired), called the leaks coming from former CIA employee Edward Snowden about the National Security Agency's role in intelligence collection a "huge breach" that undermines the country's security.
When it comes to information security, there are a lot of “misperceptions” and “exaggerations” about both the threats facing businesses and the technologies that might be used to protect their important data assets, according to Gartner analyst Jay Heiser.
Debate continues to rage today over the bombshell revelations that the National Security Agency collects intelligence on individuals via telecommunications and social-networking sites. The uproar has the U.S. government and private companies admitting to some aspects of the surveillance, while vehemently denying others. A former CIA agent working for Booz Allen Hamilton has revealed himself as the leaker.
The Design Automation Conference (DAC) held here this week celebrated its 50th anniversary, prompting the industry and academic community that poured so much energy into chip, software and hardware design to both take a look back and to predict what the future may hold.
Does the world need another operating system? Yes, according to the creative minds in the computer science department at the University of California at Berkeley, which have come up with one called the Tessellation Operating System that's intended to light up the future of the Internet of things.
Security for medical equipment such as MRI machines to and pacemakers is woeful, even though these devices today connect to networks and sometimes face risks from malware or hacking, according to a panel of university researchers speaking at this week’s Design Automation Conference.