Tag Archive for: Information

Obama pushes for more cyberthreat information sharing

U.S. businesses and government agencies need to work more closely together to combat the growing threat of cyberattacks, President Barack Obama said Friday.

Calling on U.S. agencies and businesses to share more cyberthreat information, Obama said he had signed an executive order intended to encourage more cooperation.

Protecting against cyberattacks “has to be a shared mission,” Obama said during a speech at Stanford University. “Government cannot do this alone, but the fact is, the private sector cannot do this alone either.”

To read this article in full or to leave a comment, please click here

Network World Security

Should commit history be used to convey critical information to developers?

rjzii asks:

During a meeting regarding the rollback of a third-party SDK from the latest version, it was noted that the SDK developers already announced in the commit history that the latest version should not be used.

Some developers argued that this was a bad practice and there should have been something either in the source file (i.e. ‘// Don’t upgrade SDK Version x.y.z, see ticket 1234’) or in a project level ‘README’ file. Others argued that since the commit history is part of the project documentation, it is an acceptable location for such information since we should all be reading it anyway.

Read 26 remaining paragraphs | Comments


Ars Technica » Technology Lab

BRIEF-Bluedon Information to invest 266.8 mln yuan in Internet security project – Reuters

BRIEF-Bluedon Information to invest 266.8 mln yuan in Internet security project
Reuters
Dec 16 (Reuters) – Bluedon Information Security Technologies Co Ltd. * Says plans to invest 266.8 million yuan ($ 43.11 million) in internet security project. Source text in Chinese: bit.ly/1wBpdBX. Further company coverage: ($ 1 = 6.1890 Chinese yuan …

“internet security” – read more

Mobile Security options for networks, systems and data – Information Age

Mobile Security options for networks, systems and data
Information Age
If businesses are to benefit from the potential productivity gains offered by increased mobile access – and employees are able to enjoy the convenience of BYOD – security and IT departments are faced with having to ensure their business is protected

and more »

“mobile security” – read more