Earthquakes, flooding bring new meaning to the global supply chain
Rojana Industrial Park in Ayutthaya Thailand, photo by Cpl. Robert J. Maurer, U.S. Marine Corps, 16 October 2011 (Photo is released to the public domain). As recent severe weather events on the eastern...
View ArticleWhat we learned when we rebuilt our own data centre
When we rebuilt the Compugen data centre at our new headquarters, we had a chance to put our own solutions into practice. We have seen lots of advances in technology for datacentres in recent years –...
View ArticleAt Hamilton Health, you can bring your own tablet to work
One of my favourite topics is how organizations are overcoming the security challenges of supporting user devices on a closed network. Hospitals in particular are a great example because patient...
View ArticleTruths end users never tell the IT department
Secrets. We all have them, especially when it comes to work habits. The question is, how secret are they really? I’ve often wondered if the IT department actually believes me when I tell them that my...
View ArticleNSA, PRISM and public-cloud data: how safe is it?
It came to light this week that the National Security Administration (NSA) has had access to user data in public-cloud applications such as Facebook, Google, Apple and six other applications as well...
View Article‘Lost’ smartphones experiment reveals that most people are snoops
Have you ever thought about what might happen if you left your smartphone behind? People are naturally curious, but when a lost mobile device is discovered, curiosity can lead to the violation of...
View ArticlePRISM revelations mean we have less privacy than we thought
Recent headlines about the scope of government snooping on telecommunications activities in the United States have prompted reactions ranging from outrage on the negative side to affirmation or...
View ArticleSocial engineering: network security’s weakest point
Recent news about the NSA accessing personal information, and allegations of Canadian officials spying on their Brazilian counterparts, has brought surveillance and security issues to the public eye...
View ArticleHealthcare security isn’t a sexy topic, but we need to talk about it
In a healthcare setting, there’s no doubt that security matters because hospitals deal with sensitive patient data. The only time we hear about data security in healthcare is when something goes wrong,...
View Article5 things to do if you’re still running Windows XP
If all goes according to plan, today will be the last Patch Tuesday for Windows XP and Office 2003. And while rumours still abound that Microsoft will back down and offer a low cost support option,...
View ArticleEmpower users or protect assets? We shouldn’t have to choose.
Business operates in a digital world where we spend a significant part of our day connected and interacting with people, applications and information both inside and outside our organisation. For our...
View ArticleIT Security: The door you didn’t know was open
As an IT security professional with many years in the business, I can’t remember a time when IT security has been as crucial to the success and survival of businesses. No matter how good a business...
View ArticleReducing Cost, Increasing Flexibility, and Facing Future Threats: VMWare NSX...
It is often difficult for companies to understand and appropriately react to paradigm shifts that require radically different thinking. For technology companies, having the flexibility to react...
View ArticleTaking the first step towards IT security: Where to begin
In my previous post, I wrote about some of the many reasons why IT security is vitally important for businesses today. Now I want to look at some of the challenges that companies will face, and some...
View ArticleIt’s 2018, do you know where your recovery plan is?
Data is King. Be it customer data, supply chain and resource management data, or the valuable intellectual property that forms the core of a business, it is all data; and it all needs to be stored and...
View ArticleIt’s 2018, do you know where your recovery plan is?
by Mauricio de Leon Data is King. Be it customer data, supply chain and resource management data, or the valuable intellectual property that forms the core of a business, it is all data; and it all...
View ArticleA Millimetre Away From Total Mayhem
Why every organization needs an Incident Response Plan In psychology, the phenomenon is known as illusory correlation. It’s a term that’s used to describe our ability as humans to perceive a...
View ArticleÀ deux cheveux du chaos
Pourquoi chaque organisation a besoin d’un plan de réponse aux incidents En psychologie, le phénomène est connu sous le nom de corrélation illusoire. Il s’agit d’un terme qui est utilisé pour décrire...
View ArticleHow to find the right IT security partner
Beyond the technical issues that businesses face with IT security, the greatest stumbling block to making change and implementing effective solutions is the human element, which boils down to two key...
View ArticleFive Ways Technology Drives Business Growth
Have you ever tried to use the self-checkout at the grocery store only to have the attendant come over multiple times because the system isn’t functioning as it should? The resultant delays often lead...
View Article
More Pages to Explore .....