Related Content
Internet Explorer Updates Help Attract Developers and Consumers Competitors have continued to show initiative to innovate, but a fresh update for Internet Explorer 11 has patched twenty-five of the browser’s key vulnerabilities and even added new tools to entice additional developers. Microsoft is making big moves in the browser game. |
||
Finger Vein Biometric Authentication Comes to Banking Barclays, a global banking company based in London, has announced that next year the bank will begin offering its corporate banking customers a new biometric security technology that uses finger vein authentication, eliminating the need for PINs and passcodes. |
||
Who Should Be Testing? New Considerations after Security Breaches Debates arise when people start talking about where a particular IT function should be performed. Executives can act as if testing is a necessary evil and cost is the only important factor. But due to recent security breaches, companies should be more concerned with comprehensive testing than cost. |
||
Best Practices for Big Data Big data can be a fickle beast to tame. Using data the wrong way can sometimes do more harm than good to your project or organization, but don't worry. We have you covered with some best practices on how to approach your big data implementation. Read on to find out more. |
||
Seriously, What Is Big Data? Recently, Forbes, UC Berkeley, and Inside-BigData all took to the Internet to define one of today's biggest phenomenons—big data. Among them, they offered more than fifty different definitions of big data and what it means to disparate people. So, really, what is big data? |
||
China Challenging Google and Microsoft in OS War Thanks to a lack of trust in the United States' surveillance policies, China hopes to replace massively popular properties such as Windows and Android as the leading OS in the country, both on mobile and desktop devices. The current target date for release is October. |
||
Doing Our Part to Contain Point-of-Sale Data Theft It’s easy for us as software developers and testers to dismiss intrusions on point-of-sale systems as the fault of network security professionals or inadequate network defenses. The reality is that there is a lot we should be doing as well on the software side to prevent these kinds of attacks. |
||
EMV—The Next Generation of Credit Card Security According to the US Department of Justice, approximately 16.6 million people, or 7 percent of all US residents age sixteen or older, were victims of at least one incident of identity theft in 2012. Beth Cohen looks at EMV cards—the next generation of credit card security. |