Should the Entire Internet Be Encrypted?
I recently wrote a piece about the Heartbleed vulnerability in OpenSSL that affected the security of about two thirds of…
How Consumers Foot the Bill for Data Breaches
Whether data breaches happen to individuals, companies or whole government organizations, they are rarely if ever cheap to deal with…
If You Think Data Security is IT’s Responsibility, Think Again
What does Ebay, Living Social and Adobe have in common? These companies, among countless others, have all experienced a significant…
Businesses Learn the Hard Way When It Comes to Cyber Attacks
When it comes to how businesses are approaching cyber security, most know what to do in the event of a…
4 Things You Should Know About Operation Clandestine Fox
At the end of April, computer security firm FireEye discovered a flaw in the Microsoft web browser Internet Explorer. At…
Cryptography Is Fun, But Your Business Calls for Encryption
While it’s pretty impressive that Nicolas Cage found a map on the back of the Declaration of Independence using only…
BYOD Disasters to Avoid [SLIDESHARE]
Many companies are working to implement new Bring Your Own Device (BYOD) programs in their organizations. The benefits are many,…
Smartphones and the Rise of Contextual Apps
If you are familiar with where technology is heading, you know that the future belongs to smartphones. More and more,…
MDM Industry Becoming New Standard for IT
When commercial email was incorporated into the workplace in the latter part of the 20th century, many were concerned not…
eBay’s Data Breach Exposes 145 Million User Records
In what is one of the largest data breaches in history, eBay has gone public with the news that they…