BYOD: Reducing the Risk with Mobile App Management
It is likely safe to say that the concept of Bring Your Own Device (BYOD) has gained a foothold in…
PCI-Compliant Supermarket Chain Bashas’ Breached
In February, the supermarket chain Bashas’ Family of Stores found unique malware on their network that allowed attackers access to…
Driving Data: A Slippery Ethical Slope?
When thinking about telematics, it’s easy to conjure up images of fleet tracking via GPS, satellite navigation systems for driving…
Big Data: A Revolution That Will Transform How We Live, Work, and Think
Viktor Mayer-Schönberger and Kenneth Cukier, authors of the just-published Big Data: A Revolution that Will Transform How We Live, Work, and…
Genesco Sues Visa Over PCI Noncompliance Fines
On March 7th, the sportswear company Genesco filed a lawsuit against Visa. The issue? In 2010 Genesco’s computer system was…
Cloud Security: Vetting Applications and Cloud Providers for Compliance and Security
The latest report from the Ponemon Institute, located in Traverse City, Michigan, sought to analyze trends in cloud computing security…
Informatica: Establishing Order from Information Chaos
I recently attended the annual Informatica analyst summit to get the latest on that company’s strategy and plans. The data integration…
Cybersecurity: Evernote Adds Two-Factor Authentication
On Saturday, the online SaaS (software as a service) note-collecting Evernote posted a blog with subsequent email stating that they…
The IT-ization of Consumers
There continues to be a lot of discussion of the trend that's sometimes called "consumerization of IT." I think the…
The Use and Abuse of Big Data
As we begin a new year, we are promised a move from a focus on the meaning and technology of…