Something for Everyone at Interop Las Vegas 2014
Summary Bullets: The upcoming Interop event in Las Vegas will offer lots of sessions and workshops from fellow IT professionals and experts to attend and get current on your interests. Take part in the...
View ArticleHeartbleed Bug Shows Industry is Under-investing in Software Integrity
Summary Bullets: The disclosure of the devastating Heartbleed bug – two years in the wild – illustrates how much the technology industry under-invests in software integrity. Bug bounty programs spur...
View ArticlePII in the Sky – A Cloudy Outlook
Summary Bullets: Asian governments are evolving their approach to managing PII data through legislative frameworks. Data privacy rules are converging across the region, but the onus for protection...
View ArticleNotes from the Front Line: CISOs Share their Problems and Prescriptions
Summary Bullets: The NSA leaks have created new opportunities for non U.S.-based cloud providers. Developing people and political skills among IT security pros is equally as important as developing...
View ArticleThe Pendulum’s Swing Back to Privacy is Just Getting Started
Summary Bullets: The growing use of encryption, especially in smartphones, gives privacy controls back to end users, much to law enforcement’s chagrin. The backlash against government snooping is just...
View ArticleMarking HTTP Sites as Insecure: The Emperor’s New Clothes Indeed!
Summary Bullets: Users don’t have a way for readily knowing when a site should be protected using SSL/TLS or not, and Google engineers are proposing yet another indicator. A better use of their time...
View ArticleGoogle’s New “Android for Work” Program Actually Puts BYOD to Work
Summary Bullets: Google has at last launched its Android for Work program, prioritizing Android devices within the workplace through the separation of personal and professional data profiles. But don’t...
View ArticleDear Intel, Here’s Why Selling Intel Security Would be a Huge Mistake
Summary Bullets: • A rumored sale of its security business would be a major mistake for Intel. • Intel Security has strong legacy products, promising new ones, winning leadership and strategy, and...
View ArticleDeutsche Telekom’s Car SOC is Ready to Protect Drivers—Is the Auto Industry?
Summary Bullets: • Connected cars are vulnerable to the same threats facing any Internet user or device • Deutsche Telekom proposes its Car SOC to the industry, but as of today no one is responsible...
View ArticleIoT Security is Still a Major Barrier to Adoption
Summary Bullets: • IoT security still comes up as the number one deterrent to IoT adoption, year after year (after year!). • While point solutions abound, the complex supplier ecosystem coupled with...
View Article
More Pages to Explore .....