US considers 'pre-emptive' action against cyber threats 
Oct 14, 2012 | Comment Now 
US Military chief talks tough on cyber attacks.
 
Malware targets US Defence smartcards 
By Dan Raywood | Jan 16, 2012 | Comment Now 
Attacks linked to China.
 
US Defence to keep funding spy tech 
Jan 6, 2012 | Comment Now 
Despite overall budget cuts.
 
US Navy eyes touch screen tanks 
By James Hutchinson | Oct 18, 2011 | Comment Now 
Plans to open source internal gesture library.
 
Vale DEC founder, Ken Olsen 
By Liam Tung | Feb 9, 2011 | Comment Now 
Minicomputer pioneer passes away, aged 84.
 
Flash drive exposed US war plans 
By Liam Tung | Aug 26, 2010 | Comment Now 
Old thumb drive trick.
 
Analysis: Car makers still lukewarm on driverless vehicles 
By Liz Tay | Nov 30, 2009 | Comment Now 
iTnews asks: How long before cars drive themselves?
 
Verisign launches DDoS tracking service 
By Shaun Nichols | Sep 11, 2009 | Comment Now 
Internet Defense Network monitors site attacks.
 
IBM plans to develop super brainy computer 
By Rosalie Marshall | Nov 24, 2008 | Comment Now 
IBM is pairing up with leading US universities to build a computer that emulates human brain capabilities.
 
HP wins cloud deal with US Defense Department 
By Shaun Nichols | Jul 14, 2008 | Comment Now 
HP has signed a contract to construct a huge cloud computing centre for the US Department of Defense.
 
Spintronics professor wins grant, discusses technology 
By Liz Tay | May 7, 2008 | Comment Now 
The U.S. Department of Defense has invested half a million dollars in a grant that aims to further the emerging field of quantum spin-based electronics.
 
Encryption is the last defense for data in a digital world 
By Richard Moulds, | Apr 12, 2007 | Comment Now 
We used to live in an analog world. We played records, radio stations had static interference, we flattened out dollar bills to work in vending machines and we anguished over ...
 
Train employees - your best defense - for security awareness 
By Luis Navarro, | Feb 21, 2007 | Comment Now 
With so many security threats on the horizon, it may be comforting to know the strongest security asset is already inside the company employees.
 
Transportation Security Administration, Defense Department to roll out ActivIdentity smart cards 
By Dan Kaplan | Oct 25, 2006 | Comment Now 
Digital identity provider ActivIdentity announced this week that it won key, two-year contracts to provide identification card technology to two federal government agencies ...
 
User education key defense against spear phishing 
By Marcia Savage | Aug 17, 2005 | Comment Now 
Educating users about "spear phishing" by testing them via mock phishing drills can help protect organizations against the new trend in online crime, experts said Wednesday.
 
It’s just another line of defense 
By Marcia Savage | Jun 16, 2005 | Comment Now 
Intrusion prevention might take over where detection fails, but it doesn’t mean that IPS is a magic bullet, says Marcia Savage
 
The best defense for email retention 
By Bernie Goulet | May 3, 2005 | Comment Now 
Some organizations believe that minimizing the retention time of historical email reduces their business risk. They make it a routine practice, and in certain instances attempt ...
 
Unisys buys defense security firm 
By Dan Ilett | Jul 6, 2004 | Comment Now 
Managed services provider Unisys has acquired military security firm Baesch Computer Consulting (BCC).
 
Playing Defense in Information Warfare 
By Edward Hearst | Jan 16, 2004 | Comment Now 
The September 11 attacks on the World Trade Center illustrate that in a free market economy, attacks against privately owned facilities can be even more damaging than those ...
 
Perimeter Defense Model for Security 
By Adam Lipson | Jan 14, 2004 | Comment Now 
There has to be a better way!
1 2 | Next »
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 492

Vote