Covering Scientific & Technical AI | Friday, January 31, 2025

Under Attack: Malware Roundup from Security Pros

The weekend brought no respite for anxious chief security officers, CIOs, and other professionals involved in the never-ending quest to protect data, networks, and accounts from the onslaught of ...Full Article

4 Lessons from NYSE, United Airlines & WSJ

By now, I think we all know the gory details from July 8. But just to remind you, it was a rough day: The New York Stock Exchange (NYSE) ...Full Article

The Truth About Cybersecurity Insurance

As a chief financial officer, why would a company invest $3 million to hire external experts to fix known cybersecurity issues when the company has a $10 million cybersecurity ...Full Article

Are Breaches Killing Flash?

Mozilla added the Flash Player Plugin to its roster of blocked add-ons, after yet another security alert from developer Adobe and following a public call for the end of ...Full Article

Audit Your Cloud for Security and Savings

By auditing their organizations' cloud implementations, IT departments can rein in security risks, curtail costs, improve end-user services, and enhance relationships with departments. Once IT professionals know the extent ...Full Article

Manta Beats Bots with Automated Protection

As a destination site where about 30 million small and midsize companies market themselves to each other and consumers, Manta is attractive to another form of traffic: web scrapers ...Full Article

NSA Contributes Security Tools For Puppet

IT automation specialist Puppet Labs has announced a new partner: The U.S. National Security Agency. Puppet Labs said Friday (June 19) that NSA is releasing to the open source ...Full Article

NIST Looks to Secure the IoT

Among the most vulnerable points in networks ranging from home offices to the proposed Internet of Everything are radio frequency, or RF, links that will be used to tie ...Full Article

Slam the Door Against Insider Threats

When a banker falls behind on the mortgage, a physician gets arrested for driving under the influence, or a contractor is working on a sensitive federal construction site under ...Full Article

Old Passwords, Anonymity Software Suspected in Baseball Hack

The database hacking scandal rocking Major League Baseball raises new questions about how to secure insider information about the algorithms developed by professional sports teams to evaluate prospects and ...Full Article
Page 33 of 34« First...1020...3031323334
AIwire