eWeek

Former NSA Employee Pleads Guilty To Taking Top Secret Data Home

ANALYSIS: Yet another former NSA employee has taken secret information home, allegedly enabling Russian hackers to gain access to data.

4 years ago

Senate Bill Proposes Prison Time For Failure To Report Data Breaches

ANALYSIS: The Senate Commerce Committee takes major role in investigating and creating data breach legislation and after Uber breach is…

4 years ago

Apple Using Face ID Data For Far More Than Unlocking Your iPhone

ANALYSIS: Digital model of your face will let Face ID to unlock apps or to perform other functions ranging from…

4 years ago

OpenStack Launches Kata Containers Project To Improve Security

New effort brings Intel Clear Containers and the Hyper runV technologies together to provide a secure base for running containers…

4 years ago

How HP Has Fared In Six-Plus Years Under CEO Meg Whitman

ANALYSIS: If one goes strictly by the numbers, Whitman has had a successful reign. The stock of both HP Enterprise…

4 years ago

DOJ Shares Criminal Probe Evidence With Judge In Waymo vs. Uber Suit

ANALYSIS: In a surprise development, lawyers reveal evidence from ongoing criminal investigation of Uber to the judge in Waymo’s civil…

4 years ago

Pending FCC Action On Net Neutrality Raises Unfounded Fears, Warnings

ANALYSIS: Depending on who you listen to, an FCC decision to end the reclassification of the internet might or might…

4 years ago

Why Object Storage Can Be Optimal For AI, Machine Learning Workloads

Here is why AI and ML applications demand the data management capabilities supplied by enterprise object storage solutions

4 years ago

Five Steps To Keep North Korean Hackers Out Of Your Network

ANALYSIS: You can’t prevent all attempts to penetrate your enterprise security, but you can impede the attackers and you can…

4 years ago

IBM’s Schneier: It’s Time To Regulate IoT To Improve Cyber-Security

At the SecTor security conference, IBM Resilient Systems CTO Bruce Schneier makes a case for more regulatory oversight for software…

4 years ago

North Korea Getting Ready Wage A Global Cyber War, Experts Say

ANALYSIS: North Korea’s activities have changed in a way that may indicate it is gathering the information it needs launch…

5 years ago

MIT Helping To Define New Model To Restore Trust In Cyber-Security

At the SecTor security conference, an MIT futurist details an open-source effort that aims to restore trust and improve data…

5 years ago

Benioff Says Web Giants Must Consider Tech’s Affects For Good Or Ill

ANALYSIS: Salesforce CEO Marc Benioff says tech giants, particularly Facebook & Twitter need to take full responsibility for ensuring they…

5 years ago

How AMD Wants To Provide ‘Supercomputing For All’

AMD and partners announce availability of new systems powered by high-end CPUs and GPUs to accelerate the use of supercomputing…

5 years ago

Apple’s iPhone X Includes Innovative Features You May Even Find Useful

REVIEW: The Phone X offers an all-screen front, improved camera and new security features that add significant value to this…

5 years ago

Microsoft Power BI Desktop Now More Accommodating Of Big Data Sources

In the November 2017 update to Power BI Desktop, the company adds more options to help users gain insights faster…

5 years ago

OpenStack Continues To Grow Both Public And Private Cloud Deployments

OpenStack is now powering more than 60 public cloud data centers around the world, with both private and public cloud…

5 years ago

OpenStack Aims To Improve Integration With Cloud Native Technologies

At OpenStack Summit in Australia, open-source cloud effort announces series of initiatives to help improve integration

5 years ago

What You Should Know About Setting Up Your iPhone X

ANALYSIS: There’s a lot to learn about your new iPhone X when it arrives. So set aside a few hours…

5 years ago

News Of NYC Terror Attack Changes Focus Of Senate Social Media Hearing

ANALYSIS: Experts on international terrorism turn from describing how terrorists use social media to reporting the level of chatter on…

5 years ago

New Dell IoT Division to Push Distributed Core Technology Strategy

Dell Technologies will invest $1 billion in IoT product and service development efforts

5 years ago

FCC Approves Google Project Loon for Hurricane-Devastated Puerto Rico

ANALYSIS: FCC approves license for Google's to set up its Project Loon communications system in hurricane-devastated Puerto Rico

5 years ago

Uber Says It’s Removing Secret Screen-Viewing Access To iOS Devices

ANALYSIS: Undisclosed entitlement allowed Uber to access to an iOS device’s frame buffer, which in turn could let the company…

5 years ago

Congress Grills Former Equifax CEO Over Data Breach

Richard Smith, ex-CEO of Equifax, spent two days answering questions from Congress about the data breach that exposed information on…

5 years ago

New LinkedIn Analytics Job Recruiter Tools Provide ‘Talent Insights’

When it arrives in 2018, LinkedIn Talent Insights provide data analytics that give recruiters a clearer, more complete picture of…

5 years ago

Java 9 Debuts With Jigsaw Modular Approach At JavaOne

The long, slow process of building new Java releases is getting a major overhaul in Java 9 as project Jigsaw…

5 years ago

Lenovo’s ThinkPad T470 Continues Durable T-series Tradition

REVIEW: Latest ThinkPad T-series laptop still looks like its ancestors, but it’s thinner, lighter and faster, while retaining the legendary…

5 years ago

Intelligence Experts Say Cyber-Thieves, Nation-State Hackers Teaming Up

ANALYSIS: Imagine a world where state-sponsored hackers team up with financial criminals to use ever more sophisticated tools to break…

5 years ago

Equifax Hackers Enjoyed Leisurely Tour Inside Your Credit History

ANALYSIS: The Equifax breach began on 10 March, giving hackers nearly five months to rifle through the records of 143…

5 years ago

Apple’s iOS 11 Helps iPads Catch Up With Ultrabooks, Surface Tablets

ANALYSIS: The new version of Apple’s mobile operating system is a useful upgrade for the iPhone, but it also adds…

5 years ago