Microprocessors that are unique to each Internet of Things (IoT) device is the way forward in the ongoing and tricky quest to secure the IoT, says Crypto Quantique. One idea is that by making each chip one of a kind and unclonable, an application would become almost impossible to hack. The U.K.-base..
The rise of the Internet of Things (IoT) is already having a profound impact on the world of retail, both online and in the brick-and-mortar world. But according to Darin Archer, chief marketing officer of ecommerce software vendor Elastic Path, we haven’t seen nothing yet. Via email, I asked Archer..
Some of us have been zipping files on Unix and Linux systems for many decades — to save some disk space and package files together for archiving. Even so, there are some interesting variations on zipping that not all of us have tried. So, in this post, we’re going to look at standard zipping and unz..
Enterprises operating in the traditional monolithic environment may have strict organizational structures. As a result, the requirement for security may restrain them from transitioning to a hybrid or cloud-native application deployment model. In spite of the obvious difficulties, the majority of en..
Seven months ago, Intel got a blessing not in disguise when its CEO, Brian Krzanich, was forced out amid a sexual impropriety scandal. Since then, there has been near radio silence and not a hint of who could take the captain’s chair of this $50 billion ship. It stands in stark contrast to the CEO s..
As more companies build their businesses around software, network and data-center pros will also be looking toward software to optimize their skills. While software may not be the first thing to come to mind when dealing with data centers, IT industry watchers say experienced network and infrastruct..
Cisco is rolling out a cloud-based geolocation package it expects will help customers grow mobile location services and integrate data from those services into enterprise analytics and business applications. The package, called DNA Spaces, is comprised of Cisco’s Connected Mobile Experience (CMX) wi..
Security questions have dogged the Internet of Things (IoT) since before the name was invented. Everyone from vendors to enterprise users to consumers is concerned that their fancy new IoT devices and systems could be compromised. The problem is actually worse than that, as vulnerable IoT devices ca..
If you're contemplating a career in cybersecurity and haven't come up to speed on Linux, now's the time to get ramped up and here's one easy way to do it. This new book from no starch press was written with people like you in mind. Authored by OccupyTheWeb, the force behind Hacke..
When most enterprise companies worry about having their systems hacked by attackers, the main concern is for the enterprise networks. Few companies consider that their phone systems may be vulnerable to hacking resulting in costly toll fraud. Nevertheless, the practice of hacking into corporate PBX ..