disaster recovery
network assessment
product sales
Computer Repair Scranton, PA

Technology News

ComputerWeekly: Latest IT News - Powered by: ComputerWeekly.com

Security Think Tank: Smart log monitoring and analysis key to security success (Mon, 6 Jul 2015 18:50:55 EDT) How can log management be used to bolster information security and improve incident response without infringing user privacy?
NCA signs cyber crime-busting MoU with Trend Micro (Mon, 6 Jul 2015 12:10:36 EDT) Landmark MoU will formalise and extend security firm Trend Micro’s co-operative partnership with the NCA
More than one billion contactless transactions made using Visa in Europe in 12 months (Mon, 6 Jul 2015 10:30:02 EDT) More than one billion contactless payments were made in Europe by Visa customers in the past 12 months
The internet of things could save the honeybee from extinction (Mon, 6 Jul 2015 10:00:52 EDT) Gemalto’s M2M unit is developing an ambitious project with agricultural science firm Eltopia and the University of Minnesota. The objective: to save the honeybee from extinction
East Sussex NHS data loss highlights insider threat (Mon, 6 Jul 2015 08:30:42 EDT) The latest loss of patient data by an NHS trust underlines research that around a third of data breaches are caused either accidentally or maliciously by employees
Indian suppliers increase their footprint in Ireland (Mon, 6 Jul 2015 08:10:43 EDT) Allied Irish Bank contracts Infosys in its latest outsourcing deal, which results in more external investment in Ireland
Genomics England rejects open source to deploy EMC Isilon HPC storage (Mon, 6 Jul 2015 07:30:58 EDT) 100,000 Genomes Project rejects building open-source parallel file system on x86 servers and opts for EMC Isilon clustered NAS deployed by Capita S3
CIO interview: Jaeger CIO Cathy McCabe (Mon, 6 Jul 2015 07:15:22 EDT) The luxury retailer's IT chief is taking the iconic swinging sixties brand into the digital age
Italy’s Hacking Team gets hacked (Mon, 6 Jul 2015 06:10:15 EDT) Unknown hackers have posted a torrent file-sharing link to more than 400GB of Hacking Team data, including source code, internal documents and emails that could reveal the identity of customers
Turning machine data into operational intelligence (Mon, 6 Jul 2015 05:55:06 EDT) We look at how companies analyse server and security logs to tackle cybercrime and internal fraud, and optimise the user experience