Security
Subscribe to blog
Subscribe via RSS
Security
Subscribe to this category
Subscribe via RSS
CISO Challenges: The Build vs. Buy Problem
by
Bill Gerneglia
on
Jan 23, 2013
in
Security
In a previous post, I wrote about some things that were interesting from a very neat conversation with a healthcare CISO. This post is...
CIOs Expect Smartphone Cyberattacks To Rise
by
Bill Gerneglia
on
Jan 08, 2013
in
Security
Cyber criminals expected to go after smartphones more often this year, especially as the use of phones as mobile wallets increases. Why...
A Web Developers Guide to Building Secure Applications
by
Bill Gerneglia
on
Dec 17, 2012
in
Security
Neglecting to take proper security measures at the application layer is one of the most common causes of data breaches, yet many comp...
IT Security is Cloud Centric
by
Bill Gerneglia
on
Dec 06, 2012
in
Security
For IT security, Gartner analysts are predicting that 2013 is going to be about expansion of cloud computing and the struggle by the e...
Dropbox Corporate Usage Grows As Do Security Concerns
by
Bill Gerneglia
on
Dec 02, 2012
in
Security
The issue: Dropbox is becoming increasingly popular. They claim 100 million users and many workers including IT pros use it at the of...
Page :
1
2
3
4
5
6
7
8
Next
Popular
Post
Google's Fiber Optic Internet Test
What is Cross-Site Scripting?
Discover Who’s Tracking You Online with Collusion
Interview with Jay Couse, SVP Business Development, Diversinet
Cisco Acquires Cloupia In Support of Data Center Initiatives
Desktop Version