There’s a new loo. If you’re a gadget-head, you’ve probably seen more than a few of the bizarre inventions debuted at CES over the years, including the new smart toilets.…
Inevitably, at some point in the evolution of your security strategy, you realize you need to put some controls around access. For far too long, organizations have allowed users to…
Most of us have no idea if our credentials are out in the wild, for bad actors to take and use for malicious intent. Unfortunately, they often are. Since October…
Federal IT pros are having more success tackling cybersecurity challenges within their agencies. However, there’s still much work to be done when it comes to solving the security challenges posed…
IoT has the potential to offer state and local municipalities real and tangible benefits for their citizens. The IoT is already powering smart city efforts throughout the country, through things…
If your company hasn’t had a data breach, it’s only a matter of time until it happens. Unless you begin to make a big investment in security, have regular audits…
In today’s world of constant cyberthreats from terrorism, hackers, and viruses, public and private sector organizations need to assemble a strong, experienced team of security experts. But finding a talented…
Did you read my last post with the positive story of how people are community-hacking their medical devices to improve their quality of life? While writing my last post, I…
Today’s government IT professionals set rules to provide users with access rights, improving workflows while protecting agencies against threats. Unfortunately, the prevalence of mobile devices and cloud-based applications has made…
The consensus is software-defined networking in a wide area network (SD-WAN) will provide organizations unprecedented agility but possibly at the expense of security, as traffic flow changes to a distributed…