(Originally published in Information Week, an article by Shailesh Kumar Davey) The convenience of an NFC enabled phone comes with some security risks as criminals are likely...
Why Can’t Someone Hyperloop IT?
Nerds everywhere (myself included) can finally rejoice. Our fearless leader Elon Musk — whose “Nerd Hall of Fame” resume includes founding PayPal, SpaceX, and my personal favorite, Tesla Motors — has...
5 Top Targets for Today’s Hackers
Black Hat USA bills itself as “the show that sets the benchmark for all other security conferences.” While most conferences tend to over-promote themselves, given the...
Spate of shocking cyber attacks on universities jolt academia
It is hauntingly clear – cyber criminals have set their eyes firmly on universities, research institutions, and centers of higher learning in the United States...
Where the cloud touches down: Simplifying DCIM
In most data centers, DCIM rests on shaky ground: manual record keeping and scattered documentation. Data center managers maintain–and wade through–wikis, spreadsheets, text files, and...
Your Net Worth Is Online – And Less Safe Than Ever
The Black Hat USA 2013 conference, which kicks off tomorrow in Las Vegas, brings together the brightest minds in IT security each year — those who are...
This Week’s Five: Managed Service Providers – Reality Check!
This Week’s Five is a weekly column of five interesting reads from all over the web, with a different topic each week. This week, we’ll try to...