Approach keeps analysts in the information security loop. The U.S. Air Force is researching an information assurance system that incorporates the human factor into protecting data. The system would ...
Conventional wisdom once had it that intrusion prevention systems (IPS) would eliminate the need for intrusion detection systems (IDS). But with threats getting worse by the day and IT pros needing ...
Dr. James McCaffrey from Microsoft Research presents a demonstration program that models biological immune systems to identify network intrusion threats. The demo illustrates challenges with ...
A powerful new computer security tool, called XDet, can detect malicious files being uploaded to a cloud computing service is reported this month in the International Journal of Space-Based and ...
Phil Goldstein is a former web editor of the CDW family of tech magazines and a veteran technology journalist. He lives in Washington, D.C., with his wife and their animals: a dog named Brenna, and ...
"Police blotter" is a weekly report on the intersection of technology and the law. What: A Missouri system administrator appeals his conviction for unauthorized computer intrusion. When: The 8th ...
Two hackers allegedly working for the Chinese government have been indicted by the U.S. Department of Justice over allegations that they were involved in global computer intrusion campaign over the ...