Archive for the ‘IT policy’ Category

In the 1930s, when Louis A. Simon designed the famous U.S. Bullion Depository at Fort Knox, he could only have hoped that the building would be so secure, so impenetrable, that generations of Americans would come to regard “Fort Knox” as the highest compliment that could be given to a structure whose purpose is to [...]

As technology advances, the number of cyber-attacks on both public and private networks also increases. According to the Washington Post, in 2013 alone, more than 3,000 enterprises were notified of system hacks that had the potential to expose sensitive information and powerfully damage their brands. Former NSA director Keith Alexander pointed out earlier this week [...]

Let’s start building security into the Internet of Things now, before everything becomes connected — and hackable. The Internet of Things (IoT) is weaving itself into the fabric of everyday life, including smart grids, smart meters, connected cars, and devices for the home. Gartner reports there are more than 2.5 billion connected devices today, and by 2020, [...]

Is your enterprise one of the many that are “subject to the whims of fickle consumer-business users” when it comes to adopting new technology? That’s how Clorox CIO and vice president Ralph Loura framed the current state of enterprise tech and the Bring Your Own Device (BYOD) trend when he appeared earlier this month among [...]

The Department of Homeland Security (DHS) issued a warning last week that the computer network of a public utility company had been compromised by a “sophisticated threat actor,” likely through a brute force password attack. Although the utility company repelled the attack, and there is no evidence that operations were affected, the DHS’ Industrial Control [...]