NSA uses radio waves to break into computers

The United States National Security Agency has been relying on a secret channel of radio waves that allows the agency access to almost 100,000 computers around the world, even if the machines are

Share on LinkedIn Share with Google+ Comment on this article Published on: January 15th, 2014 Nestor E. Arellano

US-CERT warns of new DDoS technique

IT organizations were warned again yesterday, about a new type of distributed denial-of-service (DDoS) attack which takes advantage of unprotected old Network Time Protocol (NTP) servers to overwhelm their victims’ systems. The NTP

Share on LinkedIn Share with Google+ Comment on this article Published on: January 15th, 2014 Nestor E. Arellano

The differences in internal controls at each level of architecture (part 3 of 3)

  This blog post continues Matthew Kern's discussion about enterprise architecture. For the previous post click here.  See here for part one in the series. Last month we went over the last two of

Share on LinkedIn Share with Google+ Comment on this article Published on: November 6th, 2013 Ron Richard

The differences in internal controls at each level of architecture

Welcome back. We have arrived as noted in my opening IT World post at the point where, expert Matthew Kern will share a new paper on EA and help us consider differences in

Share on LinkedIn Share with Google+ Comment on this article Published on: September 10th, 2013 Ron Richard

US, British spy agencies cracked Web encryption

Top secret documents revealed by former United States National Security Agency contractor, Edward Snowden indicate that American and British intelligence agencies have cracked much of the online encryption which is supposed to protect

Share on LinkedIn Share with Google+ Comment on this article Published on: September 6th, 2013 Nestor E. Arellano

US agency cracks down on medical device IT security

An American regulatory agency believes medical device manufacturers have to get tougher with IT security on anything that touches the Internet or a wireless network. The Food and Drug Administration (FDA) issued draft

Share on LinkedIn Share with Google+ Comment on this article Published on: June 13th, 2013 Howard Solomon

FBI gets the evidence on agile

One of the latest buzz-words in IT is agile software development. Who could be against it? Ah, but does your organization understand it? The fact is it takes expertise. As this article points

Share on LinkedIn Share with Google+ Comment on this article Published on: August 22nd, 2012 Howard Solomon

Cybersecurity bill rhetoric heats up in Washington

SAN FRANCISCO -- Computer vulnerabilities and how they can affect Americans' security are on the agenda for the U.S. Senate, and strong rhetoric is being used to support new legislation.The Cybersecurity Act of

Share on LinkedIn Share with Google+ Comment on this article Published on: July 24th, 2012 christina desmarais

More digital literacy training in U.S.

WASHINGTON - A nonprofit program focused on making broadband available to low-income U.S. residents has added a job-training partner to its roster and will increase its focus on using broadband to train and

Share on LinkedIn Share with Google+ Comment on this article Published on: July 18th, 2012 Grant Gross