Latest Posts tagged with Security
Editor's Blog 5/17/2013 29 comments
This week's Friday File reads like a bad sci-fi movie, with bad guys, good guys, aliens, and a robot serving cocktails.
Ron Miller 5/17/2013 14 comments
How can CIOs and CISOs ensure their companies meet government security and privacy demands when the administration itself appears to have divergent goals and intentions?
Editor's Blog 5/16/2013 44 comments
Anna Rihtar says she can't stop the man who attacked her from harassing her on LinkedIn.
Security Clan Editor's Blog 5/15/2013 9 comments
The government's hunt for whistleblowers is heating up, with journalists' phone records being secretly seized by investigators.
Rasheen A. Whidbee 5/15/2013 19 comments
Freedom of speech advocates decry the government's removal of manufacturing instructions for 3D gun from web.
Editor's Blog 5/13/2013 13 comments
Bloomberg LP's attempts to explain away the practice of news division reporters tracking subscribers' terminal use are unsatisfactory.
Todd Watson 5/9/2013 Post a comment
Turbo talks with John Marinho, VP technology and cyber security for CTIA – The Wireless Association, about the massive opportunities in mobile computing and the accompanying, and ever-looming, related security and privacy concerns.
Cloud Clan Editor's Blog 5/9/2013 9 comments
Unauthorized use of public cloud services creates concerns about security, compliance, and more.
Security Clan Editor's Blog 5/8/2013 14 comments
If a spyware vendor is using a legitimate Internet brand as cover for its intrusions, judicial intervention is needed.
Ron Miller 5/6/2013 22 comments
Why are technophiles so fixated on Google Glass privacy issues when more intrusive, less expensive devices are readily available today?
Editor's Blog 5/3/2013 37 comments
Get the goods on Glass, the scoop on social media standings, and the info about Instagram.
Todd Watson 5/2/2013 Post a comment
Phil Buckellew, IBM vice president for enterprise mobile, discusses how companies can get started and should be thinking about mobile, the importance of design thinking to mobile solutions, and the important and diverse issues surrounding mobile security.
Mansur Hasib 5/2/2013 2 comments
KP built its successful strategy on four "pillars of excellence" and tight integration between IT and business operations.
Security Clan Editor's Blog 5/1/2013 41 comments
Which technology services go the extra yard in defense of your data? The EFF's new survey has some suprising results.
Jason Mick 4/30/2013 20 comments
Freescale's new (and tiny) Kinetis chip is the latest advance for big-data within the Internet of Things.
Tam Harbert 4/26/2013 27 comments
David Riley, former CIO of Foundry Networks, was the latest – but perhaps not the last – high-tech exec to be felled by the Securities & Exchange Commission's investigation.
Security Clan Editor's Blog 4/24/2013 18 comments
Yesterday's hack of the official Associated Press Twitter feed reminds us that Twitter's security is woefully inadequate.
Maria Korolov 4/23/2013 85 comments
Smart watches are cool, and they also improve mobile security.
Ron Miller 4/23/2013 35 comments
The Senate is expected to vote on CISPA this week. If, as predicted, senators approve this legislation, President Obama has said he will veto it.
Joe Stanganelli 4/23/2013 24 comments
Online, amateur sleuths harmed real innocents in a quest for the Boston bombers.
Mansur Hasib 4/22/2013 20 comments
When Delaware created the nation's first HIE, it forged a strong role model for others to follow.
Editor's Blog 4/19/2013 18 comments
Google's Schmidt's take on drones, Twitter tackles tunes, and LinkedIn embraces mobile. And, oh yes, granny goes to Tuscany -- without leaving her kitchen.
Joe Stanganelli 4/19/2013 75 comments
Yesterday the combination of police scanners and Twitter delivered more timely and accurate news than TV broadcasts about the manhunt after the Boston Marathon bombings.
Cloud Clan Editor's Blog 4/19/2013 3 comments
The buzz about HP's cloud challenge to Amazon distracts attention from the market.
Todd Watson 4/18/2013 Post a comment
Sending good thoughts to the people of West, Texas.
David Weldon 4/18/2013 60 comments
Brands that can capture, store, and accurately analyze customers' comments on social media gain a big advantage over slower competitors.
Security Clan Editor's Blog 4/17/2013 15 comments
Spam emails referencing news about the Boston bombings come loaded with malware.
Executive Clan Editor's Blog 4/17/2013 2 comments
Budget cuts are unleashing some agency leaders' creativity, especially when it comes to no-cost funding.
Editor's Blog 4/16/2013 94 comments
News about the tragic events in Boston was drowned out on Twitter by a mix of hasty finger-pointing and well-intentioned white noise.
Editor's Blog 4/12/2013 25 comments
Star Trek vet beats Grumpy Cat, success can be painful, and security is not always Job One.
Tam Harbert 4/12/2013 33 comments
Companies may not like sharing their cybersecurity breaches, but there are several reasons why they should disclose them.
Editor's Blog 4/12/2013 25 comments
Like Osama Bin Laden's passing, the death of former British PM Margaret Thatcher has taken on a social media life of its own.
IT Clan Editor's Blog 4/11/2013 41 comments
Computer forensics helped crack the case in these murder trials.
Ron Miller 4/11/2013 62 comments
Only one web company is fighting FBI secret warrantless information requests. And it might not be who you'd think.
Security Clan Editor's Blog 4/10/2013 54 comments
Yet another (minor) public figure learns the hard way that tweets aren't private.
Matt Heusser 4/10/2013 40 comments
Could Bitcoins be the future of currency? Maybe.
Midmarket Clan Editor's Blog 4/8/2013 2 comments
As the new IT manager of SunWest Foods, longtime IT professional Dave Rowland is using his technological and business expertise to help the large rice mill stay free of bugs. Computer bugs, that is.
Editor's Blog 4/5/2013 6 comments
On Thursday, IBM unveiled a new IBM SmartCloud for Social Business datacenter in Ehningen, Germany.
Editor's Blog 4/5/2013 17 comments
Sick of robocalls? Patent trolls? Taking your car to an inspection before selling it? Friday File has the answers.
Cloud Clan Editor's Blog 4/4/2013 8 comments
Virtual desktop infrastructure can streamline IT management of the computing environment, but what happens when desktops go rogue?
Editor's Blog 4/3/2013 7 comments
Evgeny Morozov is right that our language is being laundered (yet again), but wrong to lay the blame primarily at Tim O'Reilly's door.
Security Clan Editor's Blog 4/3/2013 9 comments
An attack on a major submarine cable demonstrates the Internet's major vulnerability to sabotage.
Matt Heusser 4/3/2013 9 comments
Social media give IT the power to move beyond the datacenter and leverage Facebook's powerful tools for the company's use. That power, however, doesn't come without a price.
Executive Clan Editor's Blog 4/3/2013 Post a comment
Join us today at 2:00 p.m. ET for our latest seminar in the 7 Days of Executive Education (7DEE) series, as Dion Hinchcliff, chief strategy officer at Dachis Group, leads us through "Securing Cloud-Based Analytics."
Barbara Rembiesa 4/3/2013 10 comments
An IAITAM study found that, though most companies give employees mobile devices, only one-fourth use location-tracking systems, and only 56 percent can wipe drives remotely.
David Weldon 4/2/2013 14 comments
More physicians are using electronic prescriptions -- and that's good news for patients and pharmacists.
Todd Watson 3/29/2013 4 comments
From the discovery of sophisticated toolkits with ominous names like Flame to cross-platform zero-day vulnerabilities, both consumers and corporations have been inundated with advisories and alerts regarding emerging threats.
George Taylor 3/28/2013 25 comments
By failing to provide a framework to promote information sharing, CISPA does nothing to promote cybersecurity, and might make things worse.
Kevin Jacoby 3/28/2013 71 comments
Is there any chance of redemption for RIM?
Security Clan Editor's Blog 3/27/2013 11 comments
A feud between a spam filtering service and a hosting service has exploded into the largest DDoS attack in history.
a moderated blogosphere of internet experts
IETV: the thinkerNet on film
an IBM information resource
an IBM information resource
Expert Integrated Systems: Changing the Experience & Economics of IT
In this e-book, we take an in-depth look at these expert integrated systems -- what they are, how they work, and how they have the potential to help CIOs achieve dramatic savings while restoring IT's role as business innovator.
READ THIS eBOOK
your weekly update of news, analysis, and
opinion from Internet Evolution - FREE!
Wanted! Site Moderators
Internet Evolution is looking for a handful of readers to help moderate the message boards on our site as well as engaging in high-IQ conversation with the industry mavens on our thinkerNet blogosphere. The job comes with various perks, bags of kudos, and GIANT bragging rights. Interested?
Please email: email@example.com