Critical.
Authoritative.
Strategic.
Subscribe to CIO Magazine »

Security » Opinions »

  • Snapchat, Whisper Promise Privacy but Fail (Miserably) to Deliver

    Social media apps that promise ephemeral communications or true anonymity frequently fail to live up to all meaningful expectations.

  • Why You Really Shouldn't Worry About In-Store Beacons

    When it comes to wireless tracking and electronic spying, paranoia is often the right response. Not always, though. Case in point: The rather hysterical flap over beacons, which use Bluetooth technology to detect nearby mobile devices and deliver advertisements and other related content. You'd think the little devices were something out of a sci-fi movie, ready to track your every move and send the data to the Dark Powers that be.

  • Silicon Valley's next disruption: Reality!

    We're right on the edge of dual revolutions in artificial reality and augmented reality. It's an exciting time because we're in the final days of a world in which these technologies are considered "futuristic." By next year, early adopters will have them in their homes. Within three years they'll be mainstream.

  • HBO Will Make it Easier to Cut the Cable Cord

    Love HBO, but hate your cable company? Listen up.

  • Google's takedown policy: Celebrity nudes today, your right to know tomorrow?

    Google last week did something that is really hard to find objectionable: It said it deleted quite a few ("tens of thousands") nude pictures stolen from celebrities. But as with anything that involves such an influential company as Google, this move creates a precedent, and it's a dangerous one.

  • Three critical changes to PCI DSS 3.0 that every merchant should know

    This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.

  • Restoring user freedom in the security-first enterprise

    This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.

  • Why IT debt is mounting

    This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.

  • In iOS 8, Medical ID could be a life-saver

    Of all the new features in iOS 8, one hasn't gotten a lot of attention -- and it's the one feature that all iOS 8 users should at least consider.

  • FTC Fines Tech Giants for Violating Kids' Privacy

    Privacy advocates and the FTC are putting pressure on a number of major tech companies, including Apple, Amazon and Yelp, for allowing children to register on their sites. What's the big deal? It's not about kiddie porn or fears that a child will hook up with a molester. It's something a lot less dramatic, but still very important.

  • How to Choose the Best Vulnerability Scanning Tool for Your Business

    A vulnerability scanner, as its name implies, scans your network or system (such as a computer, server or router) and identifies and reports back on open ports, active Internet Protocol (IP) addresses and log-ons, not to mention operating systems, software and services that are installed and running. The scanner software compares the information it finds against known vulnerabilities in its database or a third-party database such as CVE, OVAL, OSVDB or the SANS Institute/FBI Top 20.

  • ‘Can everyone hear me now?'

    Mobile threats have been with us for some time. Most organizations have done a fair job of protecting their important proprietary information, securing emails, encrypting on-board data and using mobile management tools to suppress data loss. All that has made a safer mobile world for many organizations, but certainly not foolproof.

  • Encrypted data in the cloud? Be sure to control your own keys

    This column is available in a weekly newsletter called IT Best Practices. Click here to subscribe.

  • The Fappening: iCloud users, beware!

    The event dubbed by the internet as "the Fappening" is the largest celebrity nude photo leak in history. Although information is still emerging as to how, why and who is at fault, don't blame Apple for this latest security disaster. Celebrity nudes are not new; I am sure that everyone remembers the controversy surrounding Paris Hilton -- and Pamela Anderson before her. What makes this different is how these photos were taken. The celebrities involved were quick to respond to the news in a variety of intriguing ways, including the following tweet from Mary E. Winstead:

  • How to explain the cloud to your users

    Popular culture has exposed a fundamental knowledge gap in the ordinary consumer. Many people don't know where all their data is stored. They just know it's "in the cloud."

  • How to avoid 10 common Active Directory mistakes

    This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.

  • Evan Schuman: Google eyes the preteen set

    Kids say the darndest things -- and Google wants to know about and memorize each and every one of them. And not just what they say, but the sites they visit, the things they buy, the things they don't buy, the browsers they use and anything else it can suck up relating to the kids' computers, phones, networks and geolocation. Google just loves kids -- especially the part about how much retailers will pay for all of that information.

  • The trouble with trolls (and how to beat them)

    A vulnerable person. A sociopath or two on social media tormenting that person without consequence. That's trolling in a nutshell.

  • Steven J. Vaughan-Nichols: Patent trolls under attack, but not dead yet

    The patent wars keep going and going and we keep paying and paying.

  • Security Manager's Journal: Peering behind the firewall

    The corporate firewall is like a dike keeping out a raging sea of malware. Where does it all come from?

Computerworld
ARN
Techworld
CMO