Blog Posts Tagged with "Information Technology"
November 03, 2011 Added by:Richard Thieme
The task of counterintelligence is to figure out what the other side is doing and how they are deceiving us. CI is predicated on double deceiving and triple deceiving the other side into believing fictions nested within fictions, always leavened with some facts, just enough to seem real...
November 02, 2011 Added by:Scot Terban
The snow storm in October made me once again ponder my own readiness with regard to how to handle infrastructure failures. These same events have shown me just how clueless all too many people are about how to survive when their infrastructure goes down for any extended period of time...
October 27, 2011 Added by:Dan Dieterle
There is a disconnect between management and IT. Sometimes management doesn’t fully understand what the IT department is doing. Veteran computer personal are being removed from companies – “due to cutbacks”, only to be replaced shortly thereafter by inexperienced or even temporary workers...
October 21, 2011 Added by:Robert Siciliano
According to Consumer Reports, malware destroyed 1.3 million personal computers and cost consumers $2.3 billion in the last year. With the increased popularity of tablets, smartphones, and Macs, threats are becoming both more common and more complex for non-PC devices...
October 16, 2011 Added by:Bill Gerneglia
The demand for certain IT skills come and go with the economy. Certain skills are always in demand and others to a lesser degree. As an IT worker are you earning what you are worth? As an IT manager are you paying too much or too little to your IT staff?
October 14, 2011 Added by:Headlines
The Electronic Communications Privacy Act (ECPA) - signed when mobile phones were the size of bricks and the World Wide Web didn't exist – is woefully outdated, putting Americans' privacy at risk. Sens. Wyden and Kirk jointly call for updating U.S. privacy law to keep pace with technology...
October 13, 2011 Added by:Rafal Los
In the systems management world, it's about performance, deployment consistency, and uptime - metrics that can be quantified. This pattern repeats for applications and critical systems, and just about every other component of information technology - except, it seems, Information Security...
October 12, 2011 Added by:Simon Heron
The trouble is that technology is just one element of the solution. There is little doubt that while DLP software and devices can help, there is no single solution that can encompass all aspects of DLP, as different types of data have different threats and hence need different controls...
October 11, 2011 Added by:Scot Terban
Anonymous’ use of technology comes naturally, as they formed online. It is with the growth of connectivity that the movement went viral. Some may say it was the targeting. I say the targeting was always there, but those who were feeling the miasma weren’t able to express it in normal ways...
October 11, 2011 Added by:Robert Siciliano
The cloud will encourage the development of identification technologies designed to authenticate individuals online and via mobile. The sheer connectedness facilitated by the cloud and our complimentary devices will ultimately allow for a more seamless and secure digital life...
September 29, 2011 Added by:Brian McGinley
We have moved from being a computer-assisted society to one that is computer-dependent. Control is critical to maintaining a secure operation. That requires assistance from technical experts. But good control begins with a company’s employees, an area you can’t afford to ignore...
September 21, 2011 Added by:Ben Kepes
Spending so much time in the rarefied atmosphere of the twitterverse, it’s easy to assume that everyone “gets it”. The truth is somewhat different – the vast majority of people out there are still coming to terms. For them the Cloud is an unheard of concept and unexplained territory...
September 19, 2011 Added by:Joel Harding
There are literally tons of websites out there dealing with information warfare, information operations, psychological warfare, military information support operations and a myriad of topics. This website is not bad, not bad at all, it’s just not good....
September 14, 2011 Added by:Ben Kepes
It’s exciting times for PaaS players as they race to be the broadest, deepest player – but I wonder if this headlong rush to be everyone to everything isn’t going to impact on what their developers think of them. Are the new breed of uber-platforms, trying to be all things to all people?
September 14, 2011 Added by:Headlines
The ensemble is somewhat surprising - a collection of both white and black hat innovators who's activities often landed them on either side of the law, but who nonetheless had a tremendous impact on information technology as we know it today...
September 06, 2011 Added by:Bill Gerneglia
The pay premiums for 237 IT certifications continued their terrible performance for a fourth second straight quarter. This trend results in an overall loss in market value of nearly 2 percent for the quarter, according to the Foote Partners report...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013