Menu

Security / Opinions

The post-acquisition blues

The company calls in our manager to take a look around at a small software company it’s acquiring — after the deal has been signed.

Written by By Mathias Thurman28 April 16 23:32

Even paradise needs backups

Holiday travel is no time to drop your guard, especially if you take any electronic devices along.

Written by By Kenneth van Wyk25 April 16 22:49

When Locky strikes

A friend’s company is hit with aggressive ransomware and calls our manager for advice.

Written by By J.F. Rice20 April 16 00:05

Let’s not make secure encryption illegal

Restrictions are abhorrent and a draft bill in the Senate is overly broad and ambiguous. But if Congress insists on restrictions, let's add some critical limits.

Written by Evan Schuman15 April 16 07:13

All hyper-converged solutions are not created equal

Hyper-converged solutions can differ vendor to vendor and market to market. Columnist Rob Enderle writes that there are four categories of hyper-converged solutions.

Written by Rob Enderle02 April 16 04:33

Can your CEO pass the digital strategy laugh test?

If Kim Kardashian can win a top spot in the App Store, Global 2000 CIOs ought to be held to high bar for delivering compelling digital experiences at scale. Here's a by-the-numbers look at competitive digital strategies.

Written by Bryan Kirschner31 March 16 05:24

Stop Passing Around Those Passwords!

The company has sanctioned the use of an online password vault, so why is there a spreadsheet making the rounds that contains scores of passwords to servers that contain sensitive data?

Written by By Mathias Thurman30 March 16 23:02

Belgium attacks reinforce that security is everybody’s problem

In light of the tragedy in Belgium columnist Rob Enderle writes that it is more important than ever to rethink our security efforts. People seem to think security is someone else’s problem, but the reality is that security is something we all need to own.

Written by Rob Enderle26 March 16 00:05

Surprise! You have mystery PCs

Vulnerability scans uncover on the network unpatched, unprotected PCs that IT never even heard about.

Written by By J.F. Rice15 March 16 08:03

Cloud Security Training and Certification

More and more enterprise organizations are planning and deploying into cloud platforms.  This trend is occurring despite organizations historical push-back on cloud services claiming that they are less secure than private on-premises data centers.  Even though there is evidence to suggest that cloud application attacks are on the rise, there are best practice methods to secure cloud services.  On one hand, internal data center services may be tucked nice and neat behind the corporate perimeter firewall, there is evidence that many enterprises do not secure their systems adequately.  On the other hand, even though a cloud serve may be out-of-site and virtualized in a hyperscale multi-tenant data center, patching and solid discipline can make them secure.  Now that enterprises have a clearer understanding of cloud services and how to secure them, there are now commonly accepted methods to help make clouds more secure.  The appearance of cloud security training and certifications is helping organizations securely consume cloud services.

Written by Scott Hogg08 March 16 05:11

Surprising tips from a super-hacker

Virtually everyone in technology knows about Kevin Mitnick, the one-time fugitive hacker who is now a security consultant. Mitnick has a wealth of security advice for the public.

Written by Mike Elgan07 March 16 21:58

Good security begins with the endpoint in mind

In my work with new customers, I have yet to find a single one who has even a simple majority of workstations -- or endpoints as they are often known -- patched properly. Since much of the malware in existence takes advantage of known vulnerabilities, endpoint patch management is the front line of network security. This article will review the common excuses for poor patch practices, and offer specific suggestions for improvement.

Written by Robert C. Covington04 March 16 06:53

The irony in the FBI's request to unlock the iPhone

As the FBI presses forward with its court case to force Apple to create software to unlock an iPhone used by one of the San Bernardino terrorists, it could be opening a huge security hole for government employees everywhere.

Written by Lucas Mearian03 March 16 06:48

The encryption quicksand into which Apple is sinking

As the encryption argument takes center stage in the ongoing Apple vs. the U.S. Government squabbles, a very important—and potentially destructive—change is taking place in security strategy.

Written by Evan Schuman02 March 16 01:53

Market Place

Computerworld
ARN
Techworld
CMO