Hackers and Honeypots: Getting Things Done
It’s always been fashionable in the cybersecurity industry to throw up our hands and call cyber crime an intractable problem. We don’t…
FTC report puts Data Privacy in the spotlight.
From tweets to transactions, online activity produces huge volumes of data – and while businesses are primarily focused on how…
The Amazon Effect: Zuora, Citrix and the Acceleration of the Cloud Economy
When Amazon started making their infrastructure and IT processes available outside the company firewall in 2006 it was a tipping…
Does Apple Need Ten Years of Trustworthy Computing?
Researchers at Kapersky Lab recently concluded that Apple is an entire decade behin
CISPA Passes in the House, 3D Modelling of DoD Networks, and More
Today’s federal cybersecurity and information technology news round-up:
Why a Chargeback Model for Private Cloud May Be Problematic
While the economics of public cloud may be fairly clear for many organizations, public cloud is a murky area.
Cybersecurity Gaps Across Government, New Monitoring Tool, and More
This month, the Department of Energy, in working with the
Avoiding Cyber Threat Amnesia
My involvement in the non-profit educational and research organization Cyber Conflict Studies Association over the last several years has led…
Passwords are the Weakest Link in Enterprise IT Security
Organizations are spending millions of dollars to beef up their data, application and network security, but still keep overlooking one…