New Android OS will have encryption turned on by default

With reports of corporate data breaches popping up every day, users of mobile devices could be forgiven for worrying that their units will be next --particularly after NSA whistleblower Edward Snowden gives the

Published on: September 19th, 2014 Howard Solomon

IT systems of US military contractors breached, says report

The need for departmental co-operation was one of the prime lessons from the 9/11 attack which governments -- and the private sector -- should have come away with if they want to increase IT

Published on: September 18th, 2014 Howard Solomon

Surprise, CIOs! We’re using way more unauthorized cloud apps than you think

It’s almost like a throwdown, the kind of challenge that CIOs may be too proud to ignore: Let us look inside your network and show just how many employees are acting as if corporate about

Published on: September 18th, 2014 Shane Schick

Fighting back: Is the time for defensive IT security policy over?

Is it time to move away from defence-based protection of our data and IT systems and fight back against those who would use computers to  compromise power, water, communication and transportation infrastructure? It

Published on: September 17th, 2014 Dave O'Leary

The risks of bug bounties

Bug bounty programs have been around since at least 1995, when it is believed Netscape launched the first one. The latest is the refresh of Twitter's, which promises at least US$140 to those who

Published on: September 17th, 2014 Howard Solomon

iOS 8 has new capabilities that IT needs to consider

Apple's latest mobile operating system, iOS 8, will be released today, spawning a flood of users updating their iPhones and iPads for new capabilities. That will pose some problems for IT departments whose

Published on: September 17th, 2014 Howard Solomon

Augment encryption with tokenization

For the protection of sensitive data, tokenization is every bit as important as data encryption. We are all very familiar with the requirement to encrypt sensitive data at rest as well as in

Published on: September 17th, 2014 Michael Ball

Why organizations will run to the cloud, not from it

When attending the Gigaom Structure conference in San Francisco this summer, two things stood out for me: One was how few organizations are actually running loads in the cloud today. The second was

Published on: September 16th, 2014 Jeremy Hill

Using network virtualization to increase security

After server and desktop virtualization, network virtualization is the next area of the data centre to adopt the technology. It isn't going easy in enterprises, though, in part because the parts aren't completely there

Published on: September 15th, 2014 Howard Solomon