Black Hat USA bills itself as “the show that sets the benchmark for all other security conferences.” While most conferences tend to over-promote themselves, given the...
Spate of shocking cyber attacks on universities jolt academia
It is hauntingly clear – cyber criminals have set their eyes firmly on universities, research institutions, and centers of higher learning in the United States...
Your Net Worth Is Online – And Less Safe Than Ever
The Black Hat USA 2013 conference, which kicks off tomorrow in Las Vegas, brings together the brightest minds in IT security each year — those who are...
This Week’s Five: Managed Service Providers – Reality Check!
This Week’s Five is a weekly column of five interesting reads from all over the web, with a different topic each week. This week, we’ll try to...
Open Source Software: The Hidden Cost of Free
Recently, Michael Skok wrote that “open source is eating the software world.” As general partner at North Bridge Venture Partners, Skok should know. He’s witnessed the power of open...
Will mobile devices replace desktops in enterprises?
We keep hearing new concepts around mobile devices every passing day. BYOD, BYOA, MDM, MAM etc. have become the buzz words of IT industry. Are...
This Week’s Five: Active Directory Management & Beyond
This Week’s Five is a weekly column of five interesting reads from all over the web, with a different topic each week. This week, we’ll explore the...