A senior cyber security researcher at the Cybersecurity Centre for Security Studies run by ETH Zurich says while a Microsoft report on cyber operations during the Russia-Ukraine war offers some useful details it says little about the impact of these operations.
The Log4j vulnerability appears to have been overhyped by the infosec industry, with nothing like the scale of attacks expected materialising.
Claims that a leak of the user data of 533 million Facebook users has just taken place is a bit of a stretch. A major part of this data has been out on the Web for a long time.
Technology analyst firm Gartner is undoubtedly the source of a great deal of well-documented research and relevant statistics about the industry it covers.
Security companies regularly hype the dangers of operating online in order to scare the bejesus out of ordinary people – that's nothing new. But when one of them gets caught and put firmly in place, it certainly merits some mention.
Nearly three-quarters of IT decision-makers are being led up the garden path by the hype over artificial intelligence and machine-learning, and conned into believing that these technologies are the silver bullet to fix the challenges they face from cyber-security issues.
Mobile operators have plans to roll out 5G phones next year but the industry expects broad deployments among consumers to take place only in 2020, according a senior Intel official who is involved in 5G.
Despite all the hyper-ventilation by politicians who paint grim scenarios of cyber Armageddon always being around the corner, Australia is yet to face malicious activity that would constitute a cyber attack, according to the Australian Cyber Security Centre.
An ongoing dialogue on the dangers posed by the online world is good for Australia, but public discussion and understanding would benefit from more informed and considered perspectives, the Australian Cyber Security Centre says in its 2016 report.
Like many others outside the United States I patiently lined up to buy my very own Apple iPad on Friday 28th May. It certainly is a beautiful device. Yet, it falls short of being an exemplary business device.
Most cybersecurity is making up for weak platforms. We need to address the fundamentals, design platforms that prevent out-of-bounds access[…]
For most developers the security/performance trade off is still the hardest one to tackle, even as the cost of processing[…]
RISC has been overhyped. While it is an interesting low-level processor architecture, what the world needs is high-level system architectures,[…]
There are two flaws that are widespread in the industry here. The first is that any platform or language should[…]
Ajai Chowdhry, one of the founders and CEO of HCL is married to a cousin of a cousin of mine.[…]