GE Takes on Amazon in IoT with Predix Cloud
As part of its effort to provide customers with complete Internet of Things solutions, GE enhanced its Predix IoT platform to include infrastructure-as-a-service. The new Predix Cloud will leverage ...Full Article
Valerie Plame: The Spy Who Came in to the Code
Since her cover was famously blown, former covert CIA operative Valerie Plame is more openly protecting the country's digital assets. In May, the author and anti-nuclear activist joined the ...Full Article
‘Can Containers Contain?’ Remains Top Security Issue
Among the stumbling blocks to scaling application container technology are lingering concerns about security in production environments. Secure deployment of Docker and other container workloads in production was among ...Full Article
U.S. Can Learn a Lot from EU About Cybersecurity Legislation
Violence. Human rights. Universal healthcare. Cybersecurity initiatives. You may ask yourself what these four things have in common. Well, aside from being hot topics of political debate, they are ...Full Article
Intel, Micron Stack New Memory Technology
Chipmakers Intel Corp. and Micron Technology are claiming a new class of memory technology based on new materials and a three-dimensional "cross point" architecture said to deliver a 1,000-fold ...Full Article
MOOCs Teach IT Lessons Before Summer Ends
As full-time students' thoughts return to classrooms and lesson plans, IT professionals will find a slew of new online educational offerings designed to augment and expand their skills. An ...Full Article
With Cloud and Mobile, Moven Brings Banking into Digital Age
Without cloud or mobile applications, startup financial firm Moven might not exist. After all, the digital-age company is using these assets to both compete and ally with traditional banks. The ...Full Article
Getting Cybersecurity Insurance After a Breach
Getting cybersecurity insurance after a cybersecurity breach can be a daunting exercise. The primary underwriter may either drop the entire company for commercial insurance coverage or not offer cybersecurity ...Full Article
Hackers Carjack Jeep in IoT Nightmare
Two hackers successfully took control of a Jeep Cherokee as it hurtled along a highway at 70 miles per hour, turning an Internet of Things nightmare into reality – ...Full Article
Under Attack: Malware Roundup from Security Pros
The weekend brought no respite for anxious chief security officers, CIOs, and other professionals involved in the never-ending quest to protect data, networks, and accounts from the onslaught of ...Full Article