Network security needs big data
There are two types of organization now: those that have been breached, and those that just don't know it yet.
View ArticleOK, BlackBerry, what else have you got besides security?
BlackBerry's pitch to get back into the warm embrace of corporate IT shops seems logical enough at first glance: We're the most secure in mobile. Mobile is where all of your data and interactions are...
View ArticleMaking a hash of passwords
Last week, I went to a project meeting so I could provide security insights as some consulting software developers updated us on the customer-facing application they're building for us. But I was...
View ArticleTaking a gander at the security landscape
Looking around at how things are done at my new company, it's pretty easy for me to find security problems lurking virtually everywhere.
View ArticleThe Sony breach may be start of new nation-state cyberattack
It has been an exceptional year for IT security breaches, which have become part of an escalating trend in destructive attacks. And they're going to get worse.
View ArticleProtect yourself from hackers and the NSA
The downside of email, chat, text and messaging apps is that they make you feel like you're communicating privately, with only the intended recipients. And that your messages are private. Until they're...
View ArticleMore than 1 billion records breached in 2014
In IT security, worst case scenarios became commonplace in 2014, and there's no end in sight. Headline-making data breaches will likely continue into this year, as businesses, governments and...
View ArticleDon't get into an email mess
Though she may have broken no laws, Hillary Clinton acted irresponsibly in using a personal email account to conduct official U.S. government business in her capacity as secretary of State.
View ArticleWhere's the data?
It's a time-honored tradition: U.S. businesses find ways to skirt inconvenient or expensive laws by moving operations to other countries. Thus we have had U.S. corporations operating overseas to...
View ArticleSony reminds us all what a pathetically weak link email is
Sony is reliving the nightmare that its hacked databases gave rise to late last year, now that Wikileaks has thoughtfully published all of the leaked documents in a searchable database. Really, they...
View ArticleApplying the Irari Rules to a risk-based security program
The feedback from our last article, in which we laid out what we call the Irari Rules for classifying a cyberattack as "sophisticated," was overwhelmingly positive. Nonetheless, a few people we respect...
View ArticleOPM: The worst hack of all time
Hi, my name is Steven J. Vaughan-Nichols and I had a security clearance in the 1980s. Because of that, my personal records are likely to have been revealed by the Office of Personnel Management hack.
View ArticleData silos create challenges for IT managers
Security risks created by data silos is cited as a top challenge by 34 per cent of Australian and New Zealand IT managers according to an IDC survey.
View ArticleCan off-the-shelf network storage do the job I need?
It’s a big question: Is it better to buy off-the-shelf network storage, or build your own? The latest drives available at stores such as JB Hi-Fi highlight how dependable, and cost-effective, buying...
View ArticleMeeting the ongoing challenge with security and IoT
As both business and consumers show a rapidly growing interest in the Internet of Things (IoT), the lax security standards in some of these devices is coming under renewed focus.
View Article
More Pages to Explore .....