If there is one lesson that technologists need to understand in order to be successful, it’s that business is ultimately more about people than about process or technology. At the end of the day, how people think, behave and operate will have be the greatest...
A holistic approach to information security needs to address a corporate strategy for buying or building solutions. Such a strategy will have an impact on how a company looks at staffing and technology investments. There are two basic ways to look at major investments...
In 2012, the writers of malware and the attackers of networks were very busy, using both social engineering and increased technical sophistication to fuel an increased number of attacks. Not incidentally, mobile devices just flew off the shelves this year,...
If you’re going to make use of cloud-based storage, it is a good idea to ensure that you keep it secure. Unless you are absolutely, positively certain that you will never, ever put anything in there that you wouldn’t want to find in a public place, you’re going to...
Doesn’t everyone want to be a consultant? Probably not… There are some clear advantages to working for yourself, and there are some clear disadvantages. Likewise, there are some PROs and CONs of working for someone else, and it for each person to determine for...
If you haven’t already heard of Carrier IQ, you need to do some serious web searching, as they are swiftly becoming the new name in technology misuse on a massive scale. Over 6 years ago, Sony installed a rootkit with their music software in the name of Digital Rights...