Posts of category: Industry Commentary

cannon
Industry Commentary

Conversation with Thomas Cannon on Android Security, Part 1

Thomas Cannon, a security researcher, made news last month when he discovered a vulnerability on the Android OS that could make  its devices susceptible to data theft. After finding the threat, Cannon…

chuvakin_small
Industry Commentary

PCI DSS 2.0: Anton Chuvakin, PCI compliance expert, on what 2.0 means, Part 2

VPN Haus continues its conversation with PCI compliance expert Anton Chuvakin about the latest updates to PCI DSS 2.0, issued late last month.

ShahidShah
Endpoint Management·Industry Commentary

Conversation with Shahid Shah on mobile security, Part 2

This week, we feature the second part in our series with Shahid Shah, an enterprise software analyst that specializes in healthcare IT with an emphasis on e-health, E M Rs, data integration, and…

Dass
Industry Commentary

Conversation with Dr. Ruchi Dass on mHealth, Part 3

As the Mobile Health Expo 2010 gets underway next week, we’ll feature experts on the topic of mobile health. This week, we continue our conversation with Dr. Ruchi Dass, mhealth champion and council…

HIPAA·Industry Commentary

Conversation with Dr. Ruchi Dass on mHealth, Part 1

As the Mobile Health Expo 2010 gets underway next month, we’ll feature experts on the topic of mobile health. This week, VPN Haus interviews Dr. Ruchi Dass, mHealth champion and council member for the…

McKeay
Industry Commentary·IT policy

Conversation with Martin McKeay on Network Security, Part 2

We continue our conversation with Martin McKeay, a seasoned IT security professional dedicated to spreading awareness about security and privacy through his “Network Security Blog” and podcast series.

McKeay
Industry Commentary

Conversation with Martin McKeay on Network Security, Part 1

With more than a decade of experience in the IT and security field, Martin McKeay is a seasoned professional dedicated to spreading awareness about security and privacy through his “Network Security…

Industry Commentary

Mobile Devices like a “Trojan horse” into the Enterprise

John Hering, CEO of Lookout, a mobile security firm, recently told Dark Reading,  allowing a mobile device access to critical data is “almost a Trojan horse into the enterprise itself. “ Powerful…

ipv6
Industry Commentary

Ready or Not, IPv6 Security Threats are Coming

There’s a simple math problem causing quite a lot of pain for companies who use the Internet. Here’s the math: seven billion does not equal four billion. As simple as this statement is, the complexity…

Fred Cruz
Industry Commentary

Podcast: Securing Mobile Devices for Healthcare Organizations

As healthcare organizations move online to comply with new regulations and to streamline their operations, many organizations are facing compatibility, compliance, and security challenges. Fred Cruz,…