Related Content
Why Cars Need a Cyber Safety Rating If you are an auto or tech enthusiast, it’s an exciting time to be alive as the hype surrounding transportation submerged in the Internet of Things is exploding. Some see the marriage of tech and transportation as an opportunity to make our lives better; others see it as a hacker's dream. |
||
Using Assessments and Standards to Improve Your Process Process improvement is a fundamental endeavor that any successful organization must embrace. The challenge many companies face is how to effectively implement IT process improvement. A good place to begin is with an assessment of current operations; then measure those findings against good criteria. |
||
Dysfunctional DevOps DevOps is a set of principles and practices that help teams, including development and operations, to communicate and collaborate more effectively. But DevOps also has a dark side, and some dysfunctional behaviors and misunderstandings can keep organizations from implementing these best practices. |
||
The Internet Bleeds Again: eBay Hack Confirmed Last week, it was rumored that eBay’s corporate network was hacked. Later in the week, eBay confirmed the attack. The security breach, which could affect 150 million active users, leads to more speculation on how safe the Internet actually is, especially in the aftermath of the Heartbleed bug. |
||
Killing Mobile: The Advent of the "Kill Switch" Last week, many of the major phone manufacturers and wireless companies announced they would offer an antitheft feature on smartphones. The feature, known as a kill switch, will include several components aimed at deterring theft. |
||
Can Technology Solve California’s Water Problems? Recent news has shown that California is experiencing a water crisis. In this story, Joe Townsend explores whether or not modern technology, including the building of a desalinization plant, will be able to solve California's water problems. |
||
Heartbleed Bug Bypasses Web Encryption, Exposing Personal Data A significant security vulnerability called Heartbleed could allow hackers to gain access to private keys and other highly sensitive information on many widely visited websites. The problem is in the most popular software used to encrypt web communications—and the flaw has existed since 2011. |
||
Should You Be Worried about Shadow IT? If there is one thing IT professionals—especially those involved with security—like, it is control. However, we all know that shadow IT exists, which means IT professionals don’t have complete control like they used to. Joe Townsend explores whether or not shadow IT is something to be feared. |