Menu

Security / Opinions

Why cyber hygiene isn't enough

Organizations need to practice regular cyber hygiene for healthy outcomes. But they must also take steps to mitigate cyber risk—the most serious threats to our security.

Written by Bryan Ware23 June 16 01:13

Let the budget games begin!

Even when top management is enlightened about the importance of good security practices, a security manager needs to go into the budget meeting prepared.

Written by By Mathias Thurman09 June 16 00:11

LinkedIn’s disturbing breach notice

What is hard to understand is why LinkedIn didn’t feel the need to force password changes until four years after the breach.

Written by Evan Schuman01 June 16 21:51

New IoT security certification aims to make the world safer

Underwriters Laboratories new Cybersecurity Assurance Program (CAP) looks to certify Internet of Things products. Columnist Rob Enderle writes that these CAP certification will improve IoT security and help CIOs sleep better at night.

Written by Rob Enderle21 May 16 01:12

Do you still use Launchpad on your Mac?

Launchpad is one of the forgotten features in macOS that doesn’t get much attention in the media. Do you still use it on your Mac?

Written by Jim Lynch18 May 16 21:00

The post-acquisition blues

The company calls in our manager to take a look around at a small software company it’s acquiring — after the deal has been signed.

Written by By Mathias Thurman28 April 16 23:32

Even paradise needs backups

Holiday travel is no time to drop your guard, especially if you take any electronic devices along.

Written by By Kenneth van Wyk25 April 16 22:49

When Locky strikes

A friend’s company is hit with aggressive ransomware and calls our manager for advice.

Written by By J.F. Rice20 April 16 00:05

Let’s not make secure encryption illegal

Restrictions are abhorrent and a draft bill in the Senate is overly broad and ambiguous. But if Congress insists on restrictions, let's add some critical limits.

Written by Evan Schuman15 April 16 07:13

All hyper-converged solutions are not created equal

Hyper-converged solutions can differ vendor to vendor and market to market. Columnist Rob Enderle writes that there are four categories of hyper-converged solutions.

Written by Rob Enderle02 April 16 04:33

Can your CEO pass the digital strategy laugh test?

If Kim Kardashian can win a top spot in the App Store, Global 2000 CIOs ought to be held to high bar for delivering compelling digital experiences at scale. Here's a by-the-numbers look at competitive digital strategies.

Written by Bryan Kirschner31 March 16 05:24

Stop Passing Around Those Passwords!

The company has sanctioned the use of an online password vault, so why is there a spreadsheet making the rounds that contains scores of passwords to servers that contain sensitive data?

Written by By Mathias Thurman30 March 16 23:02

Belgium attacks reinforce that security is everybody’s problem

In light of the tragedy in Belgium columnist Rob Enderle writes that it is more important than ever to rethink our security efforts. People seem to think security is someone else’s problem, but the reality is that security is something we all need to own.

Written by Rob Enderle26 March 16 00:05

Market Place

Computerworld
ARN
Techworld
CMO