Much has been written about the fragmentation of the Android operating system and the resulting vulnerability of Android smartphones, particularly compared to iPhones. When Google releases a security update, the code generally is modified by Android device manufacturers, then sent on to carriers, and finally made available to users. Or not.
Some form of cybersecurity insurance has been around for a long time, and while the risk of cyberattacks has risen steadily, the market to insure against it has lagged. If your organization still favors risk acceptance and mitigation over risk transfer (insurance) when it comes to computer systems, it's in good company.
Google is taking a stand for its customers' privacy, not with regard to its own policies and practices but the federal government's. Specifically, the massive search engine operator has taken the FBI to court over a National Security Letter, and it should be commended.
New pricing plans announced last week by T-Mobile USA are a good example of the benefit to consumers and businesses of strong competition in the wireless market.
Michael Dell's plan to buy out the company he founded has hit a snag as other parties made rival bids late last week.
In a decision issued March 14, Judge Susan Illston ruled that NSLs are unconstitutional, and she ordered the FBI to cease issuing the letters and stop enforcing the gag orders that accompany them.
The IT agenda this year centers on reducing complexity, improving analytics and putting IT's strategic contribution front and center, the research found. The aim is to show that IT is not only the bedrock of the organization, but also a vehicle for enabling new ways to generate revenue.
Distractions that reduce productivity and creativity should be eliminated from the work environment, but it's important to recognize that they can come in all shapes and sizes. For some people, they could be in the form of the TV set, unattended children or the beckoning of the refrigerator. For others, they could be in the form of the prattle of office gossip, the drone of fluorescent lights overhead or sitting in traffic two hours a day.
Last week in this space I questioned the need for greater government intrusion into private computer networks in the name of cybersecurity, when so little seems to be taking place to fix one of the biggest security culprits: insecure software. This week, I am pleasantly surprised to report on an important first step the government has taken to address that very culprit.
Last week was a banner week for cybersecurity policy in Washington. After years of incessant talk in the capital, there appears to be some momentum toward defending the nation's computer systems and networks, but unfortunately it's not all heading in the right direction.