Related Content
Are Any of Yours on the List of Worst Passwords of 2015? Here’s a Top 25 List you do not want to be on: The Worst Passwords of 2015. Password management company SplashData released its annual list of the 25 worst Internet passwords, and what’s truly mindboggling is that for both 2015 and 2014, the same two passwords are at the top of the list. |
||
The Ethical Responsibility of Defect Severity Classification When dealing with defect classification, it's important to not blindly adhere to the criteria without consideration for real business or human implications. If your software does safety-critical work, do the defect levels reflect that? Or could something go live with potentially disastrous consequences? |
||
Cyber Threat Predictions for 2016 and Privacy Protection Tips The growing proliferation of digital dust is one of the key findings from the 2016 Emerging Cyber Threats Report issued annually by the Georgia Tech Information Security Center and Research Institute. |
||
DevOps or NoOps: Can You Have Too Much Automation? Some DevOps thought leaders have been promoting “NoOps,” which is the notion that IT resources can be provisioned in a fully automated way that does not require operations engineers to manage. There have been notable successes with this approach, but also some challenges. Can you have too much automation? |
||
Back to School: Cyber Safety Resources Back to school means back to homework, and more and more kids are likely to receive and submit their homework assignments online. Good or bad, today’s kids and their parents depend on the Internet, so laying down some cyber safety ground rules is important. |
||
Software Testing: A Social Responsibility As businesses and consumers embrace big data and analytics, mobile, cloud, the IoT, and other rapidly emerging technologies, the expectation that software "just works" is rising exponentially. Equipping our technical workforce with the best education and training, tools, and approaches is critical. |
||
Reliability Is Possible with Environment Management To have completely reliable systems, we must have effective IT controls in place that help to identify risks before they turn into incidents. Change management meetings are very helpful for coordination. Effective environment management and change control can keep your systems reliable and secure. |
||
The Security Risks of the Internet of Things The Internet of Things is making life easier, but is it making it more secure? If you take into account that hackers can remotely control Chrysler automobiles that are connected to a network, the answer seems to be no. If this is where our world is headed, how should we think about security now? |