After CIA leak, Intel Security releases detection tool for EFI rootkits
Intel Security has released a tool that allows users to check if their computer's low-level system firmware has been modified and contains unauthorized code.
Intel Security has released a tool that allows users to check if their computer's low-level system firmware has been modified and contains unauthorized code.
Edward Snowden may not have acted alone, and may have had outside assistance, when he leaked information about the U.S. National Security Agency's data collection and surveillance programs earlier this year.
Speaking at the CIA Women's History Month Celebration this week former U.S. Secretary of State Madeleine Albright offered a number of career advancing suggestions for women in the workforce.
One of the U.S. government's strongest advocates for cloud computing is also one of its most secretive operations: the Central Intelligence Agency.
WASHINGTON -- One of the U.S. government's strongest advocates of cloud computing is also one of its most secretive operations: the Central Intelligence Agency. But the CIA has adopted cloud computing in a big way, and the agency believes that the cloud approach makes IT environments more flexible and secure.
Last week Gen. David Petraeus, the director of the Central Intelligence Agency, resigned in response to what has turned out to be a much bigger scandal than it first appeared.