Microsoft Works to Tame the Wild Wild Web
The World Wide Web is often compared to the American Old West, such as in the
Digital Universe Study: The Big Hype
In my last post, I discussed some of the key points in the 5th annual Digital Universe study from IDC,…
Phone Hacking Scandal Reinforces the Value of Basic Information Security
The recent phone hacking scandal, where repo
The FedCyber.com Cyber Security Summit
On 28 September 2011, FedCyber.com will present a one-day Government-Industry Cyber Security S
Using Triumfant for Secure Configuration and Change Management
It’s late Monday morning when your computer security department notices that a suspicious message has been emailed to most of…
Financial Fraud Detection & Prevention Analytics Strategies
Financial industry is facing the fiercest competition in current time after the economic meltdown. Banks are using all avenues to…
Identity and Privacy: Early Indications, June 2011
With the soft launch of Google Plus, it's an opportune time to thinkabout digital privacy, insofar as Google is explicitly…
Key Trends in Cloud Computing – Mid-2011 Update
As we round the bend half way through 2011 (the year of cloud computing), we’re seeing some interesting trends emerge…