SMS Two-Factor Authentication Is No Longer Enough

With the near-constant occurrence of highly organized and complex cybercrime attacks, effective digital authentication has never been more challenging....
Read 0 Comments

The Cloud Security Alliance Publishes Its Best Practices for Big Data Security

Big Data is a boon for businesses worldwide, but the benefits come at a cost. The more data companies store, the more vulnerable they are to potential security...
Read 0 Comments

Docker Usage Rises, But High Portability Pointless for Most

Docker containers are a powerful and popular development option in the cloud. But, while many IT teams are turning to containers, few can fully take advantage...
Read 0 Comments

Containers Debunked: DevOps, Security and Why Containers Will Not Replace Virtual Machines

The tech industry is full of exciting trends that promise to change the face of the industry and business as we know it, but one that is gaining a huge amount...
Read 0 Comments
textbook

2016 LiFT Scholarship Winner Tetevi Placide Ekon: Learning Computer Science Online

Tetevi Placide Ekon is a graduate student studying civil engineering at the 2iE Institute for Water and Environmental Engineering in Burkina Faso. He was one...
Read 0 Comments

Researchers Reveal SDN Security Vulnerability, Propose Solution

Three Italian researchers have published a paper highlighting a security vulnerability in software-defined networking (SDN) that isn't intrinsic to legacy...
Read 1 Comments
Greg Burns

How IoTivity and AllJoyn Could Combine

At the Embedded Linux Conference in April, Open Connectivity Foundation (OCF) Executive Director Mike Richmond concluded his keynote on the potential for...
Read 0 Comments

Pages