According to new and somewhat controversial research from IDC Government Insights, the U.S. intelligence budget for fiscal year 2013 was reportedly set at $52.3 billion, with an additional $400 million spent across other government agencies.
Housed in one of Switzerland's numerous deserted Cold War-era army barracks, the high-tech Deltalis data center is hidden behind four-ton steel doors built to withstand a nuclear attack -- plus biometric scanners and an armed guard.
As threats and our IT environments have become increasingly sophisticated, they’ve collided with traditional security methods that have not followed suit. Is it possible to simplify security yet increase its ‘sophistication’?
Proper use of Google Glass respecting law and privacy will be all about context. Context is different depending where you are. Are you in a public place, a private place, or a restricted place like a government installation?
Understanding why passwords are so valuable to hackers can both explain and prepare enterprises to deal with potential security vulnerabilities. There are potentially hundreds of uses for stolen passwords once they are obtained.
Just as offices need to detect break-ins to keep criminals from committing industrial espionage, enterprises need to put more focus on detecting APTs and other advanced threats to keep adversaries from their network.
The smallest Amazon customer benefits from the demands being met for the largest Amazon customers. However, after you get a shiny new instance on Amazon, it’s still up to you to secure the software stack on that instance.