Monthly Archives: May 2015
Verizon Patches Security Flaw That Could Have Affected Millions
Verizon patched an online security vulnerability that could have allowed attackers to take control of some 9 million customers' home Internet accounts.The flaw was...
Putting IBM Flash Tech to Work, From Beverage to Travel Firms
Putting IBM Flash Tech to Work, From Beverage to Travel Firms
by Darryl K. Taft
Memorial Hermann Health System
Memorial Hermann Health System, the largest nonprofit health...
FireEye Exposes Hackers Hiding Botnet Controls on Microsoft Site
One of the key tools used by IT security professionals to defend against botnets is blacklisting the suspected IP address of command and control...
Moore’s Law and Intel Mark Milestones in Tech History
Moore's Law and Intel Mark Milestones in Tech History
by Jeffrey Burt
1965—Gordon Moore Makes a Prediction
Moore, in an article in an electronics trade magazine, predicts...
10 Ways IT, Business Leaders Must Collaborate on Cloud Strategies
10 Ways IT, Business Leaders Must Collaborate on Cloud Strategies
by Chris Preimesberger
Schedule Meetups to Collaborate on Cloud Decisions
The process of cloud decision-making has changed...
Microsoft Lumia 640 Smartphone Comes to Cricket Wireless
Cricket Wireless is now offering the Microsoft Lumia 640 smartphone to its no-contract wireless customers, packing plenty of quality features and a low $129.99...
Intel, Fujitsu Partner on IoT Platform
Intel and Fujitsu are teaming up to create a platform that can be used to build solutions for the growing Internet of things.Under the...
Is Homegrown Cyber-crime the Next Big U.K. Security Threat?
By Michael MooreFar from keeping aware of threats from around the world, it seems that some of the biggest cyber-security threats facing British businesses,...
IT Security, Staffing a Top Priority for Businesses in 2015
About half of businesses expect to increase their hiring of IT staff during 2015, according to a global survey of 1,507 business and IT...
The Venomous Search for the Next Heartbleed, and VENOM Isn’t It
On April 7, 2014, the security world transformed with the disclosure of the Heartbleed vulnerability, and that was never more evident than with Wednesday's...