BYOD: An Unstoppable Force?
There are not many amongst us who would even consider leaving the house without some kind of mobile device in…
A Quick Tech Tutorial: Two-Factor Authentication
Two-factor authentication is a best practice to fulfill authorization and authentication requirements for HIPAA compliance or PCI DSS compliance and…
Big Data Today: Living as Far from 1984 as Orwell
Over the last month I’ve been talking a lot about personally controlled records and the ownership of your own information.…
Seek and Destroy: U.S. Energy Firms Warned of Recent IT Threats
Last Thursday, the U.S. government released a warning about the increasing risk of cyber attacks targeting critical energy corporations; seeking…
Business Continuity and Disaster Recovery
When considering business continuity and disaster recovery options, there’s really only one constant from business to business: it’s important to…
The Big Data Security Transformation
For those of us in the security profession it an extremely exciting but also daunting time. The number and aggressiveness…
SAP’s New Fraud Management Analytical Application
SAP recently announced its new Fraud Management analytic applications. Currently in “controlled” (limited) release, it’s a promising start for the product and a…
HIPAA Breach Lessons Learned
While no records were broken when it comes to number of health records disclosed per data breach, the top HIPAA…
Indoor Locationing: The Hottest Thing in Tech
Apple’s acquisition of WiFiSlam is getting a lot of attention this week. Apple’s acquisition of WiFiSlam is getting a lot…