Expert Advice

As we round the bend into the second half of 2011, enterprises face a triple threat on the IT security front. These threats won't be easily addressed merely by updating anti-virus programs. Some attacks will be capable of reaching even the security-minded users. Here are three main threats that will...

EXPERT ADVICE

Bridging the Great Dev/Ops Divide

Under the legacy approach to software development, developers write code, which is then frozen, tested by another group, released and ultimately supported by yet another team again. Under this highly structured approach, large enterprise software applications are typically updated every 6 to 12 mont...

EXPERT ADVICE

Designing Technology’s Future

User interfaces will not necessarily change the way we live -- the technology will. However, for technology to work and be embraced by new consumers and emerging populations around the world, user interface design is crucial; it enables people to access and use the advancements in technology. Withou...

Is it just me, or does it seem like every day there's another breach to worry about? RSA, Epsilon, Sony, now Citibank -- it seems like a day doesn't go by where there isn't another high-profile breach in the news. It seems like everyone's getting hacked, and it seems like it's happening with incre...

For almost a year, service providers and their clients have been the focus of spear-phishing and other intrusions that have resulted in large-scale direct and indirect data breaches. It's scary stuff, and the worst of it is far from over. Largely, these breaches have come in two flavors: system int...

Fans of "Law and Order," "CSI" and other popular crime shows have seen their fair share of video surveillance tricks -- but have you ever stopped to compare Hollywood surveillance footage to what you see on the 11 o'clock news? In the real world, still images or video from bank or convenient store r...

EXPERT ADVICE

PCI Compliance: Offense Is the Best Defense

Even established e-commerce companies find that the right hosting partner can make a difference by performing a gap assessment that addresses specific requirements for application, network, physical and database compliance. Custom vulnerability scripts and software that ensures application, network,...

The email industry is under a prolonged and targeted attack. Going back almost a year now, service providers and their clients have been the focus of so-called spear-phishing and other intrusions that have resulted in large-scale direct and indirect data breaches. It's scary stuff, and the worst ...

Take a moment to visualize a physician traveling home in a cab from a long day. Stuck in traffic, our hypothetical physician sees this as the perfect time to catch up on email and or to do non-care-related administrative tasks. At the end of the cab ride, he or she puts the phone down to pay the d...

EXPERT ADVICE

Brewing Data Center Superfuel

Data center Quality of Service and Total Cost of Ownership has a major impact on an enterprise's business growth and profits. IT departments and application developers seek architectures and deployments providing high service availability and resilient performance scalability to meet rising service ...

Today's business has come to rely on mobility. Employees take their laptops home, work on tablets and collaborate anywhere via the Web. Unfortunately, these productivity advancements have paved the way for new cyber-vulnerabilities against an organization's private data and intellectual property. Ca...

The great contemporary architect Frank Gehry has built a reputation by challenging our core beliefs around what buildings should look like, as well as the very role of design. His work is often described as "deconstructivist," meaning that he reduces his creations to be more of a reflection of the t...

Information security pros working in the healthcare sector quite often experience a high degree of frustration and anxiety when it comes to the Security Rule's "addressable" implementation specifications. As any healthcare provider will tell you, the addressable requirements of the security rule te...

Disaster recovery is a term often used in Information Technology circles to describe the necessity for backup technology systems to safeguard an organization's data. While this type of safeguard is absolutely a necessity to protect valuable data, and also reduce the amount of time your organization...

EXPERT ADVICE

Easing the Throb of Mobile Security Headaches

There is no denying that mobile devices like tablets are changing the way we communicate, work and share information on the go -- it's the next logical step in the "post-PC" world. In addition to an increase in cloud-based services, there is a surge in multiple mobile devices -- with consumers not o...

Technewsworld Channels