ADS BY GOOGLE
From the Blogosphere

What if you knew, through legal means, something about someone where you could intervene to deliver advice to help them perform better or stay out of danger? Should you act on that? I was recently delivering a lecture at a major university in Texas and one of the participants posed a ...
Cybersecurity and the security of the data in the cloud is a hot topic. The number of companies hacked and the magnitude of losses have been growing at an alarming rate. Earlier this year, an international hacking ring stole as much as $1 billion from over 100 banks in 30 countries in ...
The tech industry has been abuzz about the potential of the Internet of Things for the past several years, and with good reason. As more devices become connected to one another, society steps even closer to the ultimate goal of an overarching, cohesive network facilitating communicatio...
I didn’t want to be so dramatic, but I couldn’t help but be completely honest as well. The end possibility is that your entire organization may suffer the fate as Sony Pictures, Target, Anthem and others that have been shaken by hacks and vulnerabilities in their networks. In some case...
The Internet of Things is here. In the coming years, billions of devices like sensors, meters or actuators will be connected to the network, sharing information and taking instructions. These connected devices will sense and deliver more data, respond to control inputs and provide more...
Developers generally like to share their code, and many of them do so by open sourcing it on GitHub, a social code hosting and collaboration service. Many companies also use GitHub as a convenient place to host both private and public code repositories by creating GitHub organizations ...
The cloud. Like a comic book superhero, there seems to be no problem it can’t fix or cost it can’t slash. Yet making the transition is not always easy and production environments are still largely on premise. Taking some practical and sensible steps to reduce risk can also help provide...
Regardless of perspective, everyone agrees that ensuring high-quality software isn’t solely the job of a “QA department.” It requires the collaboration of every discipline in the software development and delivery lifecycle from the inception of business requirements to the administrati...
For the last 15 years, companies operating in the United States and Europe have benefited from Safe Harbor - a streamlined process that allowed U.S. companies to transfer and store European citizens' data in the U.S. provided a level of privacy protections were adhered to according to ...
It is important to accept that threats come in many forms and can affect businesses greatly, for example, 15 per cent of large organisations suffered from a security or data breach in the last year involving smartphones or tablets. With increased employee mobility, businesses must equi...
It’s a given that employee access to corporate systems should be both as secure and simple as possible. Up until recently however, time-strapped CIOs, under pressure from demanding staff and challenged with authenticating users all over the world on multiple devices, have been torn bet...
Anonymous’s self-organization gives it power, resilience, and above all, agility – in fact, far more than traditional organizations with vastly superior resources. On the other hand, its efforts are often capricious, and once a particular target loses its appeal, Anonymous’s attention ...
Cyber insurance is an important element for companies as it covers the damage and liability caused by a hack, which are usually excluded from traditional liability coverage. Stricter data privacy notification laws, government incentives, cloud adoption and the increase in high-profile...
The pervasiveness of software is driving the dynamics of business transactions everywhere. We live in a time of a highly competitive and truly global economy where the question being answered among businesses now is “who can innovate the fastest?” To keep pace with the increasing velo...
Big Data is a growing trend, making it possible for businesses of every kind to gather, store, and use the unlimited personal and private data found on the internet. This massive collection allows them to predict trends, determine consumer tastes, and hone marketing plans for the great...
My father used to tell me that the key to success in life was to look people in the eye and give them a firm handshake. But the art of the handshake seems to have died in my generation. I grew up in the era of high fives, forearm smashes and fist pumps. I played baseball, so there were...
As cloud computing continues to grow in importance, enterprises are now facing a new realization. In their almost rampant embrace of cost savings associated with public cloud, many are just now understanding the information technology governance challenge posed by vastly different trad...
This is how a typical software product lifecycle works : You gather requirements, build a prototype, detail out the architecture and design, develop the product, test it, deploy the product, handle migration and maintenance and ensure product support. This is a closed loop where the Pr...
This article originally appeared on F5.com on 10.20.15. With Halloween in our rearview mirror and the holiday shopping season upon us, a couple surveys are out examining our fears and in particular, our concerns about identity theft. Apparently, ID theft is not so scary anymore –...
Cybersecurity is a complex field, and with laws varying across states and countries, keeping cloud usage compliant can become a real headache for enterprise security decision-makers. As regulations continue to lag behind the rapid pace of technological advancements, many IT security pr...
Do you have a plan in place if your business were to meet with disaster? Would your business be able to operate or would it be out of operation for the unforeseeable future? Luckily today, technology makes it possible to mitigate the damages that a disaster can cause to a business. The...
The next few years could see a paradigm shift in the way anti-virus applications work. A number of businesses have started migrating from traditional desktop based anti-virus packages to "lighter" software apps that process desktop security on the cloud. At the outset, this change is n...
How often do you get questions like ‘Have you gone to the cloud yet?’, or ‘Why aren’t we in the cloud?’, or a myriad of others along those same lines. People still talk like the cloud is a destination. I discussed this tendency last year in a blog, “The Cloud – Is It Your Actual Destin...
The age of mobile applications, pervasive use of social media and growing demand for accurate consumer data are converging to drive significant changes in how organizations connect with and market to their respective customer bases — as well as the technologies they use to do so. It’s ...
No, this isn't a tirade on the security of IoT. It's about story about change. Specifically, change and its implications on security. Change is constant. There's a million different axioms and proverbs about change, so it's really hard to choose just one to sum up how it impacts sec...
Many would argue that our critical infrastructure energy projects are only as reliable and secure as the technology serving them. Security will ultimately be the limiting factor on how much IoT is deployed. The traditional trade off of is either “easy to use” or “secure”, but not both ...
You can never be too careful. Security is on everyone’s mind. Not too long ago, we talked about how beefed up security impacts load testing and we want to continue the conversation. How do you keep yourself and your company safe in the age of industrial and state-sponsored hacking? In ...
Latest figures from the Cloud Industry Forum (CIF) indicate that cloud adoption is at its highest figure to date, with 78 per cent of organisations now having formally adopted at least one type of cloud-based service. TechNavio echoes this surge and in particular the surge in growth of...
Disaster recovery (DR) has traditionally been a major challenge for IT departments. Even with the advent of server virtualization and other technologies that have simplified DR implementation and some aspects of on-going management, it is still a complex and (often extremely) costly un...
Too many multinational corporations delete little, if any, data even though at its creation, more than 70 percent of this data is useless for business, regulatory or legal reasons.[1] The problem is hoarding, and what businesses need is their own “Hoarders” reality show about people wh...
A security profile should be at the top of the developer’s list when compiling a mobile app but that’s hardly the case. That’s a pity, because building a profile is easier to do during the dev phase. Are most mobile apps putting your data at risk? Most likely so. According to the most ...
Has your organization ever been attacked from the inside? Most companies would say no. In the latest report from the SANS Institute “Insider Threats and the Need for Fast and Directed Response”[1] only 34 percent of the more than 770 IT/security professionals in a range of industries s...
Cybersecurity is top of mind for corporations around the world. The quantity of recent data breaches and the dollar loss associated with some of them indicates either an underinvestment in cybersecurity or a failure to properly invest in people, security training or technology. While b...
Finjan Holdings, Inc. (NASDAQ: FNJN), has announced that the United States Patent and Trademark Office (USPTO) has granted its subsidiary, Finjan Inc., with U.S. Patent No. 9,141,786 (the '786 Patent) covering malicious mobile code runtime monitoring system and methods. Exponential gro...
If you’re in business, you have data. And if you’re like a lot of businesses, you have a lot of data. And it’s not only coming from your customers, it’s coming from other business units, partners, in-house applications, the cloud, hardware logs, etc. And that data could help you be bet...
As a business communications tool, email is the dominant option, and many corporations have policies that allow the use of personal email on corporate computers. In a recent Adobe Systems commissioned online survey of 400 U.S. white-collar, adult workers, more than 90 percent of them a...
A recent report from The Infoblox DNS Threat Index (in conjunction with Internet Identity) shows that phishing attacks has raised the DNS threat level to a record high of 133 for second quarter of 2015, up 58% from the same time last year. The biggest factor for the jump is the creatio...
Where is your data right now? The explosion of cloud computing and consumer IT means that your data, as well as data about you, can be virtually anywhere. Having your data and the data about you virtually everywhere is, in fact, key to the cloud computing business model. This means th...
In a recent blog article, I discussed the difference between cloud backup and cloud disaster recovery (or “DR”). In a nutshell, with cloud backup, you basically pay a third-party service provider a monthly fee to have them back up your firm’s data and store it in the cloud, so it can b...
The New Data Center has arrived. Over the past decade we have seen the migration from physical servers to virtual machines and now to public cloud, private cloud and hybrid cloud. Each of these migrations has taken a similar path. Test, dev and non-critical workloads are the first to m...


ADS BY GOOGLE