
2016: A systems security disaster
With more than 900 security breaches recorded so far, 2016 certainly looks like a disaster. And the future doesn’t look good either.

10 reasons to divorce the cloud
For some companies, using cloud services isn’t what they hoped or expected it to be. Reason’s like these might be enough to make them leave.

Your security mirages
Some of the things you use to keep your systems and data safe aren’t as secure as you think.

When DR fails
Tom Henderson learned a few valuable lessons after his server was hacked and his disaster recovery failed.

Improve IT security: Start with these 10 topics
Want to be more repsponsible about IT security in your organization? Start with these 10 security topics.
Murphy’s Law: The security version
Murphy’s Law—anything that can go wrong, will go wrong—is alive and well in the information security world. Here are 10 variants.

A breach alone means liability
Usually someone must suffer injury for a company to be held liable in a security breach. Now, a breach alone is enough.

IoT: We're serfs and pawns
The Internet of Things (IoT) is the perfect set of soldiers, and people unwittingly keep deploying insecure devices that allow others to report on us.


The many dimensions of cloud value
Cloud services marketers hope to hook you and keep you. What we need, though, is better clarity on the value of services and less vendor lock-in.

Apple’s new Bluetooth security hole
iPhone 7 users’ increased use of Bluetooth for headphones could create a security problem

Lessons learned from WordPress attacks
Infections on two WordPress websites taught this blogger a few lessons in WordPress security and disaster recovery.

VMworld 2016: Clouds are commodities
VMware says the cloud should be considered a commodity, and it wants to be your cloud broker.

When your government hacks you
Cisco was likely hacked by its own government. Concerns rise that other vendors could become victims.

Where the monsters live
Tech monsters—threats to the security of our networks, computers, devices and privacy—live seemingly everywhere.

Your next 10 security pain points
New security issues that companies need to pay attention to include container technology, data loss prevention, regulatory compliance and skills development.

Black Hat and DEF CON: The song remains the same
The Black Hat conference has grown since 2009, but the threats people talked about at it and DEF CON largely remain the same.
Russia hacks, plunders the U.S. No bullets fired
Russia has invaded the U.S. and assaulted the U.S. presidential election, and they haven’t fired a single shot—because no bullets are necessary to hack systems security.

U.S. cyber incident directive follows DNC hack
Following the hack of the Democratic National Committee, the U.S. government announced a U.S. Cyber Incident Coordination Directive.

Getting a handle on spam emanating from generic top-level domains
Generic top-level domains are often used for spam and malware attacks. There are steps they can take, though, to reduce the amount.