Consumer Passwords Keep Falling, Like Domino’s
Quick – how many times in the last couple of months have you been advised to change your password, because of a high-profile security breach or vulnerability? Let’s see now … there was the highly...
View ArticleQuick – to the Blackphone!
My colleague, Jim Rapoza, is much smarter than I am. I know this because as he was completing his thoughts on The Next (and Possibly Last) Generation of Smartphones, he asked me if I would like to...
View ArticleFour Ways to be a Dum-Dum About Your Online Passwords
Okay, so maybe you’re not an attractive celebrity who has to worry about your cloud storage account being targeted and compromised, and about those naughty selfies you took being exposed to a...
View ArticleNot So Simple Security
It’s not only the most famous line from the movie A Field of Dreams, but also the classic product management mantra: “if we build it, they will come.” The announcement of the creation of Simply Secure...
View ArticleAre We Robots?
In mid-2012, in a blog titled Are We Human?, I described some of the benefits of using technologies such as CAPTCHA, reCAPTCHA, nuCAPTCHA, and Are You A Human to help enterprises figure out whether...
View ArticlePutting IT In Perspective: Threat Intelligence
“Threat Intelligence” is one of those terms that high-tech marketers have recently grabbed on to, and are currently riding hard – you can check this out for yourself, with a quick look on Google...
View ArticlePutting IT in Perspective: Critical Security Controls
“Critical Security Controls” is another term that’s getting a lot of attention these days – check it out for yourself, with a quick look on Google Trends. The thinking behind identifying a list of...
View ArticlePutting IT In Perspective: Managed File Transfer
Managed file transfer is one of those workhorse solutions that organizations may not think very much about, although in fact it is the foundation for strategic business objectives such as collaboration...
View ArticleReconciling Enterprise Mobility And Employee Privacy: No Longer The...
In a Walt Disney comic book from long ago, Donald Duck looks to his inventor friend Gyro Gearloose to get involved in an important baseball game between two fierce rivals. Divided in his loyalties,...
View ArticlePutting IT In Perspective: Software Subscriptions
Cloud-based applications and services seem to represent a win / win scenario, if ever there was one. Users experience the benefits of broader accessibility and enhanced collaboration, while the...
View ArticleAdmitting I Was Wrong About Encryption
They say it takes a big man to admit he was wrong – and for those who know me, I am a pretty big man. Specifically, I was wrong about some things I have been saying and writing about encryption. In...
View ArticleT-Mobile Customer Information Hack: We’ve Seen This Movie Before
Chances are that by now — especially if you’re one of the 15 million unfortunate people who were directly affected — you’ve seen the news of yet another massive data breach, in which the records of 15...
View ArticleDoo, Doo, Doo, Lookin’ Out Information Security’s Back Door
Quick — what do recent news headlines about elephants, Hillary Clinton’s private email server, and national policy battles between the technology industry (Apple, Google, and dozens of others) and the...
View ArticleThe Long (Slow, Ineffective) Arm of Protecting Consumers Against Data Breaches
On December 9, 2015, it was announced that Wyndham Hotels and Resorts reached an agreement with the Federal Trade Commission (FTC), because “the company’s security practices unfairly exposed the...
View ArticleYour Phishing Attack Risk Assessment is Missing the Risk
“What is our organization’s risk from phishing attacks, and how do we reduce that risk?” In their roles as subject-matter experts (SMEs), security professionals can easily explain the who, what, when,...
View Article
More Pages to Explore .....