4 Things You Should Know About Operation Clandestine Fox
At the end of April, computer security firm FireEye discovered a flaw in the Microsoft web browser Internet Explorer. At…
Cryptography Is Fun, But Your Business Calls for Encryption
While it’s pretty impressive that Nicolas Cage found a map on the back of the Declaration of Independence using only…
BYOD Disasters to Avoid [SLIDESHARE]
Many companies are working to implement new Bring Your Own Device (BYOD) programs in their organizations. The benefits are many,…
Smartphones and the Rise of Contextual Apps
If you are familiar with where technology is heading, you know that the future belongs to smartphones. More and more,…
MDM Industry Becoming New Standard for IT
When commercial email was incorporated into the workplace in the latter part of the 20th century, many were concerned not…
eBay’s Data Breach Exposes 145 Million User Records
In what is one of the largest data breaches in history, eBay has gone public with the news that they…
Protecting Privacy: Is a Big Data Marketplace the Answer?
Big data may not be completely understood by everyone, and there are certainly things that remain unclear about it’s purpose.…
Ramifications of IT Infrastructure Everywhere
Most people don’t notice that information technology pervades our daily lives. Granted, some IT infrastructure is in the open and…
Cyber Security: How to Cover Your SaaS
While attending various conferences, roundtables and other information security gatherings, a common theme that often presents itself is the concern…
Attention Retailers: How to Avoid Being Attacked
I feel like I’m stuck in Bill Murray’s Groundhog Day. Yet again, it came to my attention that a major…