Archive for the ‘Industry Commentary’ Category

Flipping through any consumer publication that rates vehicles, you’ll see all the metrics you would expect – from safety and performance (acceleration, braking, etc.) to comfort, convenience and fuel economy. What you won’t find is an assessment of the car’s risk of being remotely hacked. Unfortunately, if you happen to drive a 2014 Jeep Cherokee [...]

Even though the Houston Astros have been the worst team in Major League Baseball for the last three seasons, one of the team’s off-the-field accomplishments — its proprietary internal computer database — is now the envy of the rest of the league. This system, known as Ground Control, allows the team’s front office executives to [...]

As technology advances, the number of cyber-attacks on both public and private networks also increases. According to the Washington Post, in 2013 alone, more than 3,000 enterprises were notified of system hacks that had the potential to expose sensitive information and powerfully damage their brands. Former NSA director Keith Alexander pointed out earlier this week [...]

In the not-so-distant past, when enterprises lacked ubiquitous high-speed Internet connections and the means to provide employees with remote access, organizations were far more likely to enforce strict working hours than they are today. After all, work wouldn’t get done if employees weren’t present. Mobile technology has since enabled the growing trend of remote work, [...]

Enterprises are constantly fighting to stay one step ahead of hackers, from upgrading endpoints using the now vulnerable Windows XP to Windows 8 or implementing more secure remote access technologies in light of the Target breach. Then came Heartbleed, which necessitated another immediate response for countless enterprises. Creating and executing a network security plan can feel like fighting the [...]