2016: A systems security disaster

2016: A systems security disaster

With more than 900 security breaches recorded so far, 2016 certainly looks like a disaster. And the future doesn’t look good either.

10 reasons to divorce the cloud

10 reasons to divorce the cloud

For some companies, using cloud services isn’t what they hoped or expected it to be. Reason’s like these might be enough to make them leave.

Your security mirages

Your security mirages

Some of the things you use to keep your systems and data safe aren’t as secure as you think.

When DR fails

When DR fails

Tom Henderson learned a few valuable lessons after his server was hacked and his disaster recovery failed.

Improve IT security: Start with these 10 topics

Improve IT security: Start with these 10 topics

Want to be more repsponsible about IT security in your organization? Start with these 10 security topics.

Murphy’s Law: The security version

Murphy’s Law: The security version

Murphy’s Law—anything that can go wrong, will go wrong—is alive and well in the information security world. Here are 10 variants.

A breach alone means liability

A breach alone means liability

Usually someone must suffer injury for a company to be held liable in a security breach. Now, a breach alone is enough.

IoT: We're serfs and pawns

IoT: We're serfs and pawns

The Internet of Things (IoT) is the perfect set of soldiers, and people unwittingly keep deploying insecure devices that allow others to report on us.

The IoT is uranium

The IoT is uranium

IoT devices are like uranium—as dangerous as post-Soviet era nuclear weapons.

The many dimensions of cloud value

The many dimensions of cloud value

Cloud services marketers hope to hook you and keep you. What we need, though, is better clarity on the value of services and less vendor lock-in.

Apple’s new Bluetooth security hole

Apple’s new Bluetooth security hole

iPhone 7 users’ increased use of Bluetooth for headphones could create a security problem

Lessons learned from WordPress attacks

Lessons learned from WordPress attacks

Infections on two WordPress websites taught this blogger a few lessons in WordPress security and disaster recovery.

VMworld 2016: Clouds are commodities

VMworld 2016: Clouds are commodities

VMware says the cloud should be considered a commodity, and it wants to be your cloud broker.

When your government hacks you

When your government hacks you

Cisco was likely hacked by its own government. Concerns rise that other vendors could become victims.

Where the monsters live

Where the monsters live

Tech monsters—threats to the security of our networks, computers, devices and privacy—live seemingly everywhere.

Your next 10 security pain points

Your next 10 security pain points

New security issues that companies need to pay attention to include container technology, data loss prevention, regulatory compliance and skills development.

Black Hat and DEF CON: The song remains the same

Black Hat and DEF CON: The song remains the same

The Black Hat conference has grown since 2009, but the threats people talked about at it and DEF CON largely remain the same.

Russia hacks, plunders the U.S. No bullets fired

Russia hacks, plunders the U.S. No bullets fired

Russia has invaded the U.S. and assaulted the U.S. presidential election, and they haven’t fired a single shot—because no bullets are necessary to hack systems security.

U.S. cyber incident directive follows DNC hack

U.S. cyber incident directive follows DNC hack

Following the hack of the Democratic National Committee, the U.S. government announced a U.S. Cyber Incident Coordination Directive.

Getting a handle on spam emanating from generic top-level domains

Getting a handle on spam emanating from generic top-level domains

Generic top-level domains are often used for spam and malware attacks. There are steps they can take, though, to reduce the amount.

Load More