Hitachi said Monday it will officially support Amazon Web Services as part of its cloud solution offerings, a victory for Amazon over rival Microsoft Azure. Amazon and Microsoft have long been locked in competition for the Japanese cloud ...
Tags: Hitachi, Amazon, Web Service
Electricity supply is not same everywhere, worldwide. Sudden or frequent power disruption can actually harm our computer systems & other gadgets that are commonly found at home, educational institutes, shops, malls, public transport, ...
Tags: Power Supply Systems
Andy Kemshall, co-founder and technical director at SecurEnvoy, speaks up about voice recognition as a security tool Banking is one of the most security-sensitive sectors there is. In March, it was announced that UK bank fraud had risen ...
American International Group (AIG) has introduced CyberEdge mobile application for iPads, intended to provide improved information on cyber risk and assist in dealing with the same. The new application has been designed following a survey ...
Tags: Cyberedge Mobile Application, AIG
China's reputation for security may have been marred by recent U.S. accusations of state-sponsored hacking but the nation is still a safe place as a tech subcontractor for foreign businesses, according to one of China's largest IT ...
Tags: Computer Products, IT, IT outsourcing
A spokesman for the U.S. Army Corps of Engineers today downplayed the significance of a recent incident of unauthorized access to a database containing potentially sensitive information on thousands of high hazard dams across the country. ...
Tags: Computer Products, software
Wi-Fi can be so tempting, making it easy for you to do just about anything online when you're away from home. But you should be thinking before clicking, because most public Wi-Fi could make your private information a bit too, well, public. ...
In a bid to improve data security, Amazon Web Services (AWS) has launched AWS CloudHSM, which uses a separate appliance to protect cryptographic keys used for encryption. There are already a variety of alternatives for protecting ...
Tags: Amazon, data security
Less than six week after the Department of Homeland Security (DHS) issued a civil rights impact assessment stating that the government needed no warrant or cause to search laptops and other electronic devices at U.S. borders, a federal ...
Tags: laptops, electronic devices, smartphones
nCrypted Cloud, a cloud data privacy company that brings world-class privacy to data stored on cloud storage providers such as Dropbox, GoogleDrive and SkyDrive, has announced the launch of its free nCrypted Cloud service. Nick Stamos, ...
Tags: Free Service, Image Data, cloud storage
The Office of Information Technology at the U.S. Department of Veterans Affairs has disputed a finding by the agency's Inspector General that several VA centers routinely transmit unencrypted sensitive personal data over the public ...
Tags: Office of Information Technology, Veterans Affairs, public Internet
It's hard to hear the phrases, "Your mission, should you decide to accept it" or "this tape will self-destruct in five seconds" without bringing to mind Tom Cruise as Ethan Hunt (or for the older readers, Dan Briggs or Jim Phelps) of the ...
Professional social networking service LinkedIn won the dismissal of a lawsuit seeking damages on behalf of premium users who had their log-in passwords exposed as a result of a security breach of the company's servers last year. The data ...
The Australian Institute of Health and Welfare wanted to add to its armoury of analytical services and take advantage of its recent accreditation to access sensitive data sets. AIHW is the national agency for information and analysis ...
Tags: Australian Institute of Health and Welfare, analytical service
The company is the latest to be attacked after recent cyber attacks on Apple, Facebook and Twitter. Evernote's security team discovered suspicious activity in its network which attempted to access secure areas of its service. Evernote ...
Tags: cyber attack, Apple, Facebook, Twitter