Expert Advice

EXPERT ADVICE

Speeding Up Your PC, Part 4: Managing Drivers

Driver software manages communications between a computer and its system components and peripherals, such as printers, graphic and sound cards, motherboards, game controllers, Bluetooth devices, and other hardware. Driver software acts like a translator, helping a computer's operating system communi...

Lots of people think that updates aren't really that important. In the past, updating a program often involved implementing small features or fixes that, most of the time, didn't seem worth the bother. While this may still be true for some applications, there's no doubt that updates are crucial fo...

What is hard-drive clutter, and why is it bad? When people think of things that take up space in their hard drive, usually they think of the files they've made, including documents, pictures and media. They may also think of the programs they use to run those files. While you can delete some files o...

The most common complaint that people have about their computers is slow performance -- screens that seem to load more slowly, emails that seem to "hang" before opening. Too many users are frustrated by seeing their expensive machines become bogged down by factors that are hard to identify, making ...

Security has been a top concern of the Olympic Games ever since that fateful day in September of 1972 when terrorists killed members of the Israeli Olympics team. Since then, each Olympics has only increased its level of security consideration. The more recent games have had to focus as much on cyb...

It has been a heck of a year for password/password hash disclosures. In the same week in June, millions of password hashes were disclosed from LinkedIn, eHarmony and Last.fm. And in the same week in July, more than 450,000 usernames and unencrypted passwords were reportedly stolen from Yahoo Voice, ...

It may seem like Houdini is inside the network, because the perimeter as we have known it is disappearing. Conceptually, firewalls used to sit between the public Internet and the internal network with its servers, desktops and applications. There was a clear network perimeter separating internal res...

EXPERT ADVICE

Process Maturity and the Fine Art of Control

If you're in IT and your job involves securing your organizations' infrastructure, you've probably spent a good deal of time thinking through control selection -- in other words, picking the controls that most directly help you accomplish the goal of securing your environment. And you've probably a...

EXPERT ADVICE

5 Tips for Braving the BYOD Boom

On today's information technology landscape, one thing is glaringly obvious: Security concerns associated with employees bringing personal devices onto the corporate network -- both internal and external -- are keeping IT managers up at night. The "consumerization" of IT is having an enormous impact...

There is no debating that integrations with small business platforms are a great way for app developers to gain increased exposure and, ultimately, additional sales for their tool or service. Many established software providers in the space are opening their doors through APIs to make it easier for...

Platform as a Service solutions for the cloud are continuing to pop up all over in the world of software due to their simplicity, efficiency and strong developer orientation. Several different PaaS platforms are being built for specific technology stacks. At the application level, most PaaS solution...

EXPERT ADVICE

Isolated Systems Need Love Too

Information security has changed a lot over the years. Way back in the dinosaur days, life was simple. Companies set up a firewall at the border and life was good. Bad guys stayed on one side of the fancy flashing box, and our personnel lived in the pristine, attacker-free paradise on the inside. W...

EXPERT ADVICE

The Lighter Side of IT Consumerization

You've probably heard the term "consumerization of IT." Some of the network and security pros reading this probably think this is yet another meaningless industry buzzword with little or no value. However, to dismiss it as such is to potentially miss out on what is both a very powerful concept ...

EXPERT ADVICE

Big Data, Tough Questions

If you work with SIEM, you've been spending more than a couple of years, dealing with "Big Data" -- more lines of logs than any one person, or even a reasonable-sized team of people, could ever hope to keep up with reading through. Our data is plenty big enough already. So why is everyone so hyped o...

It may be that the hype around cloud computing has settled, but security concerns continue to make headlines and are often cited by CIOs as top priorities. CompTIA's latest trends study found that while many U.S. companies trust the cloud enough to use it, only 13 percent trust it enough for heavy l...

Technewsworld Channels