Searched for: "the changing face of vulnerabilities"
- Security (25)
- Microsoft (14)
- Enterprise Software (8)
- Cxo (7)
- Networking (7)
- Software (6)
- Mobility (5)
- Developer (4)
- Open Source (4)
- Collaboration (3)
- Data Centers (3)
- Hardware (3)
- Project Management (3)
- Banking (2)
- Cloud (2)
- Tech & Work (2)
- After Hours (1)
- Android (1)
- Apple (1)
- Big Data (1)
- Innovation (1)
- Printers (1)
- Social Enterprise (1)
About 105 results for "the changing face of vulnerabilities"
Business and liberal arts majors are starting to win information security jobs away from computer science graduates as the changing nature of the job requires softer skills - accor...
Learn how the battle over privacy technologies could define the future of the web. This TechRepublic cover story explains the strange history and the serious consequences of the fi...
Regulation and the "sharing economy" was the topic of a recent panel discussion in the U.S. House of Representatives. Alex Howard summarizes the highlights.
The Presidency of Mexico's national digital strategy coordinator, Alejandra Lagunes, speaks with Alex Howard about the country's plan for open government and digital innovation.
18F has quietly become the bleeding edge of the US federal government's adoption of open source software. Read about the benefits and challenges of open source going mainstream.
Jack Wallen compares Google Wallet to Apple Pay and questions the slow adoption of both technologies.
In this paper, about biometric systems the general idea is to use of facial recognition to reinforce security on one of the oldest and most secure piece of technology that is still...
Natural disasters have threatened mankind since history started. Due to geographic location and environment change, there are many vulnerable countries to natural disasters. The co...
In the wake of security concerns and a PR nightmare following allegations of spying by governmental organizations, Microsoft steps up security for its cloud products and opens a tr...
See what six weeks have brought about in the wake of Heartbleed, one of the most famous vulnerabilities in history.