Israel Lifshitz offers advice on how CIOs can ensure their organization's data remains safe in a BYOD program, while also giving employees the freedom and flexibility they demand.
Kim Komando gives advice on minimizing your digital footprint.
The public is outraged over the loss of personal privacy, but these two journalists found no one wanted to do the work necessary to protect their own privacy. Do companies and governments need only to wait for the emotion to pass to get on with their work unimpeded? And if so, does this mean Big Brother is a certainty and ultimately inescapable?
Look for big data fueled changes in the workplace very soon. If you're an employer, start looking for ways to offset bias in the raw data so that your final analysis is accurate and useful.
Target CIO Beth Jacob has resigned in the wake of the security breach that saw hackers make off with millions of credit card details belong to its customers.
A highly critical vulnerability in a cryptographic code library has been discovered, and threatens to affect hundreds of open source packages across various Linux distributions.
Microsoft will be releasing a total of five updates for March 2014, according to the latest Microsoft Security Bulletin Advance Notification that was released. The relatively lightweight update consists of two "critical" updates with the final three pegged as "important."
California has launched a campaign to better educate organizations on the cyber security threats they face and steps they can take to better safeguard themselves.
Just as we get word that Target is completely reorganizing its IT security program, two more security studies confirm the vulnerabilities that many organizations face.
It would be wonderful if we could all back in time and prevent ourselves from doing anything that would release our information to any entity and prevent it from finding a life of its own in the wild. But it's too late for all but the unborn.