Data Management

With hurricane season in full bloom and the additional prospect of natural disasters, the importance for companies to have disaster data plans in place is paramount. TechNewsWorld discussed disaster preparedness with a panel of IT experts. Check out their recommendations -- and make sure that you ha...

TECH BLOG

The Case Against Full-Disk Encryption

The information security industry, with all its raging debates, has rallied around a small corpus of best practices. One of the highest on this list is full-disk encryption, which security experts regard as sacrosanct. This is the encryption that ensures that someone who snatches your device won't b...

Oracle's new offerings, really packaging of existing recent high-performance products for the enterprise market, enable companies to continue running their data and datacenters on premise while still benefitting from gains made by its autonomous database like eliminating most forms of routine mainte...

With billions of dollars of federal contracts at stake, information technology providers are being swept up in the tide of a new U.S. Department of Defense information security requirement that will become mandatory for IT providers and other companies doing business with DoD. While IT companies alr...

Twitter had a data security problem last week that might sound trivial. Email addresses, phone numbers, and the last four digits of the credit cards used to buy ads on Twitter were left in browser cache after the transaction, and that cache was not secured. This may seem trivial, but the consequence...

Twitter on Tuesday notified business clients that their personal information, including email addresses, phone numbers, and the last four digits of their credit card numbers may have been compromised. Self-serve advertisers that viewed billing information on ads.twitter.com or analytics.twitter.com ...

Two separate teams of academic researchers have published papers describing flaws in Intel's Software Guard Extensions. SGX enhances application security by letting developers partition sensitive information into enclaves with hardware-assisted enhanced security protection. The aim is to protect app...

Microsoft and Intel researchers have found a way to combine artificial intelligence and image analysis to create a highly effective means to combat malicious software infections. The researchers call their approach "STAMINA" -- static malware-as-image network analysis -- and say it's proven to be hi...

In what could be a trial run for more of the same, Red Hat held a first-ever virtual technical summit to spread the word about its latest cloud tech offerings. CEO Paul Cormier welcomed online viewers to the conference, which attracted more than 80,000 virtual attendees. The company made several key...

The Linux Foundation will host the Trust over IP Foundation, a cross-industry effort to ensure more secure data handling over the Internet. This new foundation is an independent project enabling trustworthy exchange and verification of data between any two parties on the Internet. The ToIP Foundatio...

The United Kingdom's plans to launch a smartphone application to track potential COVID-19 infections won't include Apple and Google. The country's National Health Service has designed its own mobile software to do contact tracing of people exposed to the coronavirus. The NHS reportedly found that it...

More than any other factor, it is our asset that determines the kind of adversary we face. For most of us, our asset is the corpus of sensitive personal details consequent to online transactions. This all comes down to how much data an adversary can glean from you, and how thoroughly it can analyze ...

Canonical has announced the general availability of Ubuntu 20.04 LTS, codenamed "Focal Fossa." This major upgrade places particular emphasis on security and performance. Released once every two years, the new long-term support version provides a platform for enterprise IT infrastructures and workloa...

Google, Apple and MIT have made headlines with announcements of contact tracing mobile apps in the wings. Their purpose is to identify contacts of people who test positive for COVID-19 so appropriate actions can be taken to stem its spread. However, a Cambridge University professor threw some cold w...

Technewsworld Channels