The view from the top of IT with TechWorld Editor Rohan Pearce
This tool helps with a lot more than telling you at a glance about the threats you face.
By J.F. Rice | 03 December, 2013 17:24
International travel can require some pretty strong security measures if your devices contain sensitive information.
By Kenneth van Wyk | 02 December, 2013 14:18
Security incidents are a complete disruption of my normal day-to-day activities. I love them. I especially like it when they uncover systemic problems we might not otherwise have found out about. We had one of those this week.
By Mathias Thurman | 02 December, 2013 14:18
Here are two new devices that can help improve audio quality for voice calls, whether you're in the office or out on the road.
By Keith Shaw | 25 November, 2013 10:43
Every fall, I conduct a policy review. I think it's a good idea to have this on my calendar, because no policy, no matter how well crafted, is meant to last for all time. New standards arise and old ones are modified, making some policies deficient. Or a security incident, an audit or some business reality that was previously unacknowledged emerges to demonstrate how a policy falls short.
By Mathias Thurman | 18 November, 2013 16:03
The rock: Users want to use their smartphones for work. The hard place: Security is deficient. All CIOs are caught between the two.
By Thornton A. May | 18 November, 2013 11:34
Embarrassment over the revelations about the NSA's domestic activities is a poor reason to prosecute the man who shined the light on them.
By Ron Miller | 12 November, 2013 11:21
The outcry over the NSA/GCHQ Internet surveillance scandal can't hide the fact that huge corporations won't say what they know.
By Jonny Evans | 11 November, 2013 14:06
In-house developers show themselves to be woefully behind the times when it comes to security via authentication.
By J.F. Rice | 06 November, 2013 13:36
Premier 100 IT Leader Richard Maranville also answers questions on career management.
By Richard Maranville | 04 November, 2013 15:05
You will never be secure if you labor under the delusion of privacy.
By Ira Winkler | 28 October, 2013 14:47
A thriving industry of paid-for user comments pollutes social networks with fake opinions. Let the reader beware.
By Mike Elgan | 26 October, 2013 11:05
I love DLP! That's not a statement that would sell a chief financial officer on data leak prevention, but I can show real ROI from our deployment as well.
By Mathias Thurman | 21 October, 2013 13:32
Cloud provider Nirvanix went belly up. Even if you weren't one of its clients, you can learn things from that mess.
By Steve Duplessie | 09 October, 2013 18:14
Premier 100 IT Leader Robert Krestakos also answers questions on certifications and acting on suspicions.
By Robert Krestakos | 07 October, 2013 22:48
I took somebody's word for something, and I didn't subsequently check it out to my own satisfaction. Result: big trouble. Lesson: always verify.
By Mathias Thurman | 07 October, 2013 13:52
Our manager hadn't realized how the government affected his daily life until he couldn't get to government websites that hold information he needs.
By J.F. Rice | 07 October, 2013 13:14
What if NSA leaker Edward Snowden hasn't been reckless but instead is following a carefully thought-out plan? If so, we can make some guesses about what revelations will come next.
By Jay Cline | 18 September, 2013 13:26
It's budget season, which means I get to create a wish list of security goodies I'd like to buy.
By Mathias Thurman | 09 September, 2013 13:42
TPM has always sounded like a good idea. But the problem with 'trusted computing' has alwasy been knowing how trustworthy it is.
By Steven J. Vaughan-Nichols | 09 September, 2013 10:11