Our analyst points out that security relies too much on technology, and that human experience, interpretation, and judgment will always be required. But here is an example of too much faith being placed in humans, and an obvious opportunity to leverage proven and widely-used technology.
Here are some of the business implications raised by the Heartbleed bug, disclosed as CVE-2014-0160.
For over a year, Microsoft has told us about the risks of continuing to run Windows XP after its last day — that day has arrived.
Here are some basic building blocks for getting ahead of the consumerization of IT train, in the context of virtualization and cloud computing infrastructure.
By unanimous decision of the judges in the court of popular opinion: GibSec 3, Snapchat 0, and 4.6 million Snapchat users lose.
Here are some of the basic building blocks for getting ahead of the consumerization of IT train, using file sync / file sharing as an example.
In honor of April Fool’s Day, here is a new section to the series of blogs on The Devil’s Dictionary for IT and IT Security.
It’s essential and urgent that we bridge the divide between the generally more technical security practitioners and the generally less technical business leaders. If we can’t figure out how to do this, the bad guys will continue to win.
In the small town of Greenland, New Hampshire on the day after Christmas 2013, a town employee opened an email indicating that they had received a voice message from AT&T…and infected the computers at the Town Hall with malicious software known as CryptoLocker.
Even if your organization has done all the right things and still been breached, you still have to communicate to your customers about an awkward and unpleasant topic.