Quantcast
Channel: Derek Brink – Business 2 Community
Browsing all 15 articles
Browse latest View live

Consumer Passwords Keep Falling, Like Domino’s

Quick – how many times in the last couple of months have you been advised to change your password, because of a high-profile security breach or vulnerability? Let’s see now … there was the highly...

View Article



Quick – to the Blackphone!

My colleague, Jim Rapoza, is much smarter than I am. I know this because as he was completing his thoughts on The Next (and Possibly Last) Generation of Smartphones, he asked me if I would like to...

View Article

Image may be NSFW.
Clik here to view.

Four Ways to be a Dum-Dum About Your Online Passwords

Okay, so maybe you’re not an attractive celebrity who has to worry about your cloud storage account being targeted and compromised, and about those naughty selfies you took being exposed to a...

View Article

Image may be NSFW.
Clik here to view.

Not So Simple Security

It’s not only the most famous line from the movie A Field of Dreams, but also the classic product management mantra: “if we build it, they will come.” The announcement of the creation of Simply Secure...

View Article

Image may be NSFW.
Clik here to view.

Are We Robots?

In mid-2012, in a blog titled Are We Human?, I described some of the benefits of using technologies such as CAPTCHA, reCAPTCHA, nuCAPTCHA, and Are You A Human to help enterprises figure out whether...

View Article


Image may be NSFW.
Clik here to view.

Putting IT In Perspective: Threat Intelligence

“Threat Intelligence” is one of those terms that high-tech marketers have recently grabbed on to, and are currently riding hard – you can check this out for yourself, with a quick look on Google...

View Article

Image may be NSFW.
Clik here to view.

Putting IT in Perspective: Critical Security Controls

“Critical Security Controls” is another term that’s getting a lot of attention these days – check it out for yourself, with a quick look on Google Trends. The thinking behind identifying a list of...

View Article

Image may be NSFW.
Clik here to view.

Putting IT In Perspective: Managed File Transfer

Managed file transfer is one of those workhorse solutions that organizations may not think very much about, although in fact it is the foundation for strategic business objectives such as collaboration...

View Article


Image may be NSFW.
Clik here to view.

Reconciling Enterprise Mobility And Employee Privacy: No Longer The...

In a Walt Disney comic book from long ago, Donald Duck looks to his inventor friend Gyro Gearloose to get involved in an important baseball game between two fierce rivals. Divided in his loyalties,...

View Article


Image may be NSFW.
Clik here to view.

Putting IT In Perspective: Software Subscriptions

Cloud-based applications and services seem to represent a win / win scenario, if ever there was one. Users experience the benefits of broader accessibility and enhanced collaboration, while the...

View Article

Admitting I Was Wrong About Encryption

They say it takes a big man to admit he was wrong – and for those who know me, I am a pretty big man. Specifically, I was wrong about some things I have been saying and writing about encryption. In...

View Article

Image may be NSFW.
Clik here to view.

T-Mobile Customer Information Hack: We’ve Seen This Movie Before

Chances are that by now — especially if you’re one of the 15 million unfortunate people who were directly affected — you’ve seen the news of yet another massive data breach, in which the records of 15...

View Article

Image may be NSFW.
Clik here to view.

Doo, Doo, Doo, Lookin’ Out Information Security’s Back Door

Quick — what do recent news headlines about elephants, Hillary Clinton’s private email server, and national policy battles between the technology industry (Apple, Google, and dozens of others) and the...

View Article


Image may be NSFW.
Clik here to view.

The Long (Slow, Ineffective) Arm of Protecting Consumers Against Data Breaches

On December 9, 2015, it was announced that Wyndham Hotels and Resorts reached an agreement with the Federal Trade Commission (FTC), because “the company’s security practices unfairly exposed the...

View Article

Image may be NSFW.
Clik here to view.

Your Phishing Attack Risk Assessment is Missing the Risk

“What is our organization’s risk from phishing attacks, and how do we reduce that risk?” In their roles as subject-matter experts (SMEs), security professionals can easily explain the who, what, when,...

View Article

Browsing all 15 articles
Browse latest View live




Latest Images