Articles By Andreas M. Antonopoulos

Security-as-a-service is growing

Security-as-a-service is growing

When you ask IT professionals if they use cloud computing or software-as-a-service, most start by saying "no". But if you...

September 1st, 2010 Andreas M. Antonopoulos
Our growing security quagmire

Our growing security quagmire

Information security was always an esoteric field but with personal computing came personal security issues, culminating in the identity theft...

May 20th, 2010 Andreas M. Antonopoulos
Cloud security: Root of trust

Cloud security: Root of trust

I've been thinking a lot about public cloud security lately. Not simply mulling the theoretical question of "is cloud more...

February 17th, 2010 Andreas M. Antonopoulos
Mobile malware will test Android and iPhone

Mobile malware will test Android and iPhone

2009 ushered in mobile malware with the first (and second) worm for Apple Inc.’s (NASDAQ:AAPL) iPhone appearing just before Christmas....

January 13th, 2010 Andreas M. Antonopoulos
Why long complex passwords may be less secure

Why long complex passwords may be less secure

Most companies have some form of policy on passwords. The rules go back more than a decade and are repeated...

September 29th, 2009 Andreas M. Antonopoulos
Data leakage prevention going mainstream

Data leakage prevention going mainstream

Data leakage or data loss prevention systems have gradually entered the mainstream as their increasing maturity has allowed increasing adoption....

September 9th, 2009 Andreas M. Antonopoulos
Iran’s data leakage problem

Iran’s data leakage problem

After Iran’s statistically and historically dubious election results, the world was been glued to screens (both TV and IP) watching...

July 30th, 2009 Andreas M. Antonopoulos
Building a data center security architecture

Building a data center security architecture

Data center architecture has been changing quite dramatically over the past few years. In many data centers, organic growth had...

July 6th, 2009 Andreas M. Antonopoulos
Old policies can impair unified communications

Old policies can impair unified communications

If your security model is location-centric and depends on keeping things separate, how do you respond to a disruptive technology...

April 21st, 2009 Andreas M. Antonopoulos
The fantasy and reality of government security

The fantasy and reality of government security

In the movies the government has always got the best toys, the cutting-edge technology and the tightest security standards. Those...

March 17th, 2009 Andreas M. Antonopoulos