Category Archives: Uncategorized

Connected Cars – The Challenges And Benefits

Connected Cars – The Challenges And Benefits

The Future Of Connected Cars & IoT  Internet of Things is transforming the automotive world by developing connected car technologies that offer significant benefits to carmakers and consumers alike. Generally, connected cars are meant to reduce traffic congestion, fuel consumption, emissions and most importantly, road accidents. It seems the phrase “reduce waste, loss and cost,”…

White House Details Its Cybersecurity Efforts For 2015

White House Details Its Cybersecurity Efforts For 2015

Cybersecurity Efforts For 2015 The White House has issued a fact sheet that details its efforts to ensure that cyber defense strategies are meeting the critical cybersecurity challenges currently facing the USA. This is in response to the increased sophistication and severity of cyber attacks both internationally and within the US, and involves long-term risk…

Code42 Appoints Joe Payne As New CEO – Sight On $75 Billion Market Opportunity

Code42 Appoints Joe Payne As New CEO – Sight On $75 Billion Market Opportunity

Code42 Appoints Joe Payne As New CEO The US endpoint data protection and security company, Code42 has appointed experienced software-as-a-service (SaaS) executive, Joe Payne as its new president and chief executive officer (CEO). Payne, who has a strong reputation for building technology brands, and managing teams through high-growth periods, plans to lead Code42 to new…

Fortinet and NTT Com Security Form Global Security Partnership

Fortinet and NTT Com Security Form Global Security Partnership

Companies to Jointly Provide Capabilities in Cloud Security, Network Risk Management, SIEM, SDN and Virtualization to Companies Globally SAN FRANCISCO, CA and THEALE, READING, UNITED KINGDOM–(Marketwired – July 13, 2015) – NTT Com Security, the global information security and risk management company, and Fortinet, a leader in high performance cyber security solutions, have entered into…

China Drafts New Law To Safeguard Its Cyberspace Sovereignty

China Drafts New Law To Safeguard Its Cyberspace Sovereignty

China Drafts New Law State media in China today revealed that its parliament has published a draft law that will “safeguard national cyberspace sovereignty,” as well as “security and development.” It is widely agreed that once accepted, the new law will consolidate government control over digital data and consequently have significant consequences for international and…

A Marketplace of Networks: Simplifying Enterprise Cloud Connectivity

A Marketplace of Networks: Simplifying Enterprise Cloud Connectivity

Simplifying Enterprise Cloud Connectivity and Consumption Cost. Agility. Innovation. For the modern-day enterprise, the advantages of migrating business applications to the Cloud are many. From substantial cost savings realized through economies of scale and pay-per-use models, to faster innovation and time to market, to the agility and flexibility of auto-scaling systems to accommodate growing application…

Pentagon, FBI And NSA Train US And British Officials For Cyber War

Pentagon, FBI And NSA Train US And British Officials For Cyber War

Officials Train For Cyber War Banking and energy officials joined members of the Pentagon, National Security Agency (NSA) and the Department of Homeland Security for a three-week cyber war game in Suffolk, Virginia last month. The exercise was designed to train US and British officials and military personnel, as well as several key-companies, for inevitable large-scale cyber…

Interoperable Cloud Based Video Conferencing Platform

Interoperable Cloud Based Video Conferencing Platform

Interoperable Cloud Based Video About going into the cloud, a lot of people just hear jargon and words. In many ways jargon is meant to exclude people from what some feel should be knowledge protected from outsiders. However, jargon is in the end only words, and by breaking down the jargon the subject becomes understandable.…

Google Cloud Source Repository

Google Cloud Source Repository

Google hasn’t announced it yet, but the company earlier this year started offering free beta access to Cloud Source Repositories, a new service for storing and editing code on the ever-expanding Google Cloud Platform. It won’t be easy for Google to quickly steal business from source code repository hosting companies like GitHub and Atlassian (with Bitbucket).…

Tech Company Finds Stolen Government Log-ins All Over Web

Tech Company Finds Stolen Government Log-ins All Over Web

WASHINGTON (AP) — A CIA-backed technology company has found logins and passwords for 47 government agencies strewn across the Web — available for hackers, spies and thieves. Recorded Future, a social media data mining firm backed by the CIA’s venture capital arm, says in a report that login credentials for nearly every federal agency have…