An approach that has worked for centuries in all sorts of industries is just as applicable to the security field.
By Ira Winkler | 17 April, 2014 04:30
Luckily, gadget-makers understand the cruelty of travel, and are always creating new devices that help the mobile worker/road warrior ease the pain of a hotel room with few outlets, or expensive in-room Wi-Fi. Here are three gadgets I've recently tested that can help you on your next trip:
By Keith Shaw | 16 April, 2014 03:14
If our checks and balances are so fragile that a typo can obliterate all meaningful security, we have some fundamental things to fix.
By Evan Schuman | 15 April, 2014 21:38
Companies are engaged in a kind of arms race with competitors to see how many apps they can get everyone to use. But this aggressive push for more apps is going to end up giving users app fatigue.
By Mike Elgan | 12 April, 2014 21:20
Employees can unintentionally share more than their employers want anyone to know.
By Evan Schuman | 08 April, 2014 21:33
The end of Microsoft support is fast approaching, and the company still has a lot of machines running the old Windows operating system.
By J.F. Rice | 02 April, 2014 02:52
Evan Schuman: Resurrection of Full Disclosure mailing list is great news, if you're not a cyberthief
The alternatives to an independent list like Full Disclosure can't match it for stopping new cyberattack tactics.
By Evan Schuman | 01 April, 2014 23:50
The evidence keeps mounting that companies that put out mobile apps are not paying nearly enough attention to security.
By Evan Schuman | 25 March, 2014 17:13
Thank you, Target! It's a pity that security managers have to capitalize on other organizations' misfortunes to broker change within their own enterprises, but the notorious Target breach of late last year just might get me some things I think my company has needed.
By Mathias Thurman | 24 March, 2014 14:13
And what is going to have to happen before we see that we must set the smartest minds on coming up with newer, safer and less complicated security methods?
By Ron Miller | 24 March, 2014 10:37
When a world that's characterized by ubiquitous data collection and surveillance can lose sight of a jumbo jet, you start to question the worth of all that spying on us.
By Ron Miller | 17 March, 2014 16:31
It offers slightly greater payment convenience, but at what cost?
By Evan Schuman | 11 March, 2014 12:08
As a security manager, I expect my company to be hit by malware infestations, data theft, denial-of-service attacks and attempts at unauthorized access. I deal with them all as they arise, and they do keep things interesting.
By Mathias Thurman | 10 March, 2014 13:49
And without remote management, getting patches onto devices scattered throughout the organization is hit or miss.
By J.F. Rice | 06 March, 2014 14:42
The notebook features a lightweight yet tough finish, and the latest tech specs; up to 16GB of memory; storage options up to 1TB hard drive or 256GB SSD; 802.11ac Wi-Fi.
By Keith Shaw | 05 March, 2014 23:13
Even if a company were willing to expunge personal data that it had been authorized to collect, the realities of IT systems mean it probably could never completely do that.
By Evan Schuman | 04 March, 2014 13:10
Premier 100 IT Leader Stuart Kippelman also answers questions on career growth.
By Stuart Kippelman | 04 March, 2014 12:58
In the past week, two new ultra secure smartphones have been in the news. One is called the Blackphone. The other is called the Black phone. The difference in their names is a space. Here's what we know about the two most secure smartphones ever created.
By Mike Elgan | 01 March, 2014 12:08
Over the past few weeks we've been snowbound several times, which also included a school vacation week. With my kids asking me for the one-millionth time "What can we do, Dad?", fortunately I had two technology-related items for the column to test out, and they would also appeal to the youngsters as well as adults.
By Keith Shaw | 28 February, 2014 17:37
This whitepaper is the second in a three-part series on distributed denial of service attacks (DDoS) and multi-tier DDoS protection. This section details the design and capabilities of different forms of protection architecture designed for a variety of circumstances, while also providing alternative approaches. The paper also explains how to maintain availability, including network and application defense and DNS DDoS Mitigation.
- FTOBIEE BI/DW ConsultantNSW
- FTMicrosoft Business Intelligence ConsultantNSW
- FTBrand Relationship Manager | RTB Trading Desk | Digital Advertising | SydneyNSW
- FTIT Support EngineerNSW
- FTCampaign Managers | RTB | Display + Video | Trading desk |SydneyNSW
- FTContent StrategistNSW
- FTMicrosoft Business Intelligence DeveloperNSW
- FTDeliverability SpecialistNSW
This helpful infographic demonstrates how, when IT is the backbone of modern business, a converged infrastructure system can solve the challenge of cost, complexity, availability, rapid provisioning and flexibility.
- IT security is national security -- but you're not alone
- Exclusive: Google's Project Loon tests move to LTE band in Nevada
- Enterprise who? Google says little about Apps, business cloud services in Q1 report
- Where's my gigabit Internet, anyway?
- Samsung teams with GlobalFoundries on 3D chips
- World Tech Update: Google buys drone maker Titan Aerospace and NHK shows off 8K television
- Music labels sue Pandora over pre-1972 recordings
- AMD's profitability streak ends at two quarters
- Netcraft tool flags websites affected by Heartbleed
- Israeli start-up, working with GE, out to detect Stuxnet-like attacks
- Facebook wants to help you meet friends offline
- Tor anonymity network to shrink as a result of Heartbleed flaw
- For Red Hat, it's RHEL and then...?
- Report: Oracle pushes back against Oregon officials over troubled health care site
- Google Glass to get a workout from Dutch firefighters