Obama curtails NSA’s phone snooping activities

United States President Barack Obama on Friday called for an end to the way the National Security Agency monitors and gathers data on telephone records of Americans as well as those of heads

Published on: January 17th, 2014 Nestor E. Arellano

NSA uses radio waves to break into computers

The United States National Security Agency has been relying on a secret channel of radio waves that allows the agency access to almost 100,000 computers around the world, even if the machines are

Published on: January 15th, 2014 Nestor E. Arellano

US-CERT warns of new DDoS technique

IT organizations were warned again yesterday, about a new type of distributed denial-of-service (DDoS) attack which takes advantage of unprotected old Network Time Protocol (NTP) servers to overwhelm their victims’ systems. The NTP

Published on: January 15th, 2014 Nestor E. Arellano

The differences in internal controls at each level of architecture (part 3 of 3)

  This blog post continues Matthew Kern's discussion about enterprise architecture. For the previous post click here.  See here for part one in the series. Last month we went over the last two of

Published on: November 6th, 2013 Ron Richard

The differences in internal controls at each level of architecture

Welcome back. We have arrived as noted in my opening IT World post at the point where, expert Matthew Kern will share a new paper on EA and help us consider differences in

Published on: September 10th, 2013 Ron Richard

US, British spy agencies cracked Web encryption

Top secret documents revealed by former United States National Security Agency contractor, Edward Snowden indicate that American and British intelligence agencies have cracked much of the online encryption which is supposed to protect

Published on: September 6th, 2013 Nestor E. Arellano

US agency cracks down on medical device IT security

An American regulatory agency believes medical device manufacturers have to get tougher with IT security on anything that touches the Internet or a wireless network. The Food and Drug Administration (FDA) issued draft

Published on: June 13th, 2013 Howard Solomon

FBI gets the evidence on agile

One of the latest buzz-words in IT is agile software development. Who could be against it? Ah, but does your organization understand it? The fact is it takes expertise. As this article points

Published on: August 22nd, 2012 Howard Solomon

Cybersecurity bill rhetoric heats up in Washington

SAN FRANCISCO -- Computer vulnerabilities and how they can affect Americans' security are on the agenda for the U.S. Senate, and strong rhetoric is being used to support new legislation.The Cybersecurity Act of

Published on: July 24th, 2012 christina desmarais