Search

Results 21-40 of 40 for Ed Moyle.
EXPERT ADVICE

3 WannaCry Talking Points to Win Security Buy-In

By this point, most tech practitioners -- and nearly all security practitioners -- know about WannaCry. In fact, you might be sick of people analyzing it, rehashing it, sharing "lessons learned" about it, and otherwise laying out suggestions -- in some cases, contradictory -- about what you might d...

ANALYSIS

Surviving the Security ‘Skills Desert’

If you've ever spent time in a desert, it may seem inconceivable to you that creatures actually can live there. The fact that animals not only survive, but also thrive in those conditions seems counterintuitive. In fact, a number of animals do so -- in many cases, they are aided by an array of speci...

ANALYSIS

Intelligence-Driven Supply Chain Resilience

Information security practices are undergoing a transformation. For at least a decade, environments have been becoming less perimeter-centric: Gone are the good old days when in-line controls protected the trusted, safe interior from the "wild west" of the outside. As environments become more compl...

ANALYSIS

The Old Man and the Tsunami: A Security Story

There's a folk-story that all Japanese schoolchildren learn about an old man who lives in a village by the sea. One day, an earthquake hits. He's the only person in the village to realize that a tsunami will soon follow. He hurries to the nearby mountainside where the rice for the village is grown a...

ANALYSIS

Heartbleed: SaaS’ Forbidden Experiment?

Have you ever heard the term "The Forbidden Experiment"? If you're not familiar with it, it's a concept originating in the behavioral sciences relating to challenges in understanding human language development. Specifically, the "experiment" in question refers to actually testing empirically what ...

BEST OF ECT NEWS

5 Security Strategies for the Internet of Things

The Internet of Things has been receiving quite a bit of attention. Definitions vary, but at its core the concept is a simple one: Extend computing and data-processing capability to the physical world around us. The earliest manifestations of this are starting to be seen already in the growth of sma...

EXPERT ADVICE

An SMB’s Guide to PCI 3.0 Penetration Testing

By now, if you're an IT professional and you're in an organization that has PCI-DSS in your scope -- that is, you store, process or transmit credit card data -- you probably already know that an update to the standard, Version 3.0, was released late last year. With this update come a few changes to ...

EXPERT ADVICE

5 Winning PCI 3.0 Ways

As most security and compliance pros already know, PCI 3.0 is now officially out. The specific changes it includes have already been covered in quite a bit of detail elsewhere in the industry press, so I won't cover them all again here. However, one area that is often less discussed is how to use th...

EXPERT ADVICE

Securing the Internet of Things: 5 Easy Pieces

The Internet of Things has been receiving quite a bit of attention. Definitions vary, but at its core the concept is a simple one: Extend computing and data-processing capability to the physical world around us. The earliest manifestations of this are starting to be seen already in the growth of sma...

ANALYSIS

Revisiting Risk Assessment in the Cloud

As the prolific trend of adoption would suggest, the case for cloud is compelling from both a business and technology perspective. There are a number of reasons for this, but one of the more compelling reasons from a technologist's point of view has to do with the ability to abstract lower levels of...

ANALYSIS

4 Quick and Dirty SaaS Technical Controls

Because of the rapid pace of SaaS adoption, many security practitioners have found themselves scrambling to ensure the security of the specific technologies their enterprises want to employ. However, the dynamics of SaaS can make this a challenging exercise. This is because most of the options for s...

ANALYSIS

Staying Secure in the Cloud-Adoption Aftermath

By now, most organizations have adopted cloud. Increased and widespread adoption as well as expansion of existing deployments are reflected in recent surveys. This suggests that if you're a technology pro and your organization is like most, you've already spent considerable time addressing how to fi...

ANALYSIS

Avoiding Unpleasant Cloud Surprises

For most technologists in the enterprise nowadays, cloud is a pretty big deal -- and securing it can be an even bigger deal still. Security was the top concern of 46 percent of respondents to a recent survey by North Bridge Venture Partners. While this number is actually down from last year's 55 pe...

EXPERT ADVICE

Thinking Through Your 2008 Security Budget

For some people, November is all about festivity: turkey, cranberry sauce and the start of the long ramp-up to the December holidays. However, that's not always the case if you happen to be in IT security. If you are, you know that November can be anything but festive -- unless your idea of "festiv...

EXPERT ADVICE

Can’t Plan? Get an Edge With Metrics

Have you seen the "change of plans" commercial? I can't remember what it's an advertisement for, but the ad consists of a series of clips of two businesspeople in a series of airports talking to each other via cell phone. Every time they talk they say things like "change of plans, going to Singapore...

EXPERT ADVICE

It’s 10 P.M. – Do You Know Where Your Data Is?

Do you remember the "Perfectly Normal Beast" from Douglas Adams' Hitchhiker's Guide series? If you haven't read about it, the Perfectly Normal Beast is a fictional creature -- kind of like a buffalo -- that migrates twice a year across the fictional "Anhondo Plain." It's -- ironically -- called "pe...

EXPERT ADVICE

E-Discovery and the SMB

It seems like everybody's talking about e-discovery nowadays -- just take a look at any IT trade journal or IT news source and you're likely to see at least one article about what e-discovery is and how to prepare for it. However, despite all this attention, both in IT and legal circles, there are s...

EXPERT ADVICE

Vulnerability and Penetration Testing: What’s the Difference?

We don't typically stop to think about it, but we all need feedback in order to succeed. Imagine, for example, trying to cook a meal without periodically tasting it to see if the spices are right. When it comes down to it, trying to do anything -- even the simplest of tasks -- is much more difficul...

OPINION

How I Learned to Stop Worrying and Love ISO 27001

Five years ago, it was the rare technologist who spent much time dealing with compliance and regulatory issues. Up until relatively recently, only a handful of technologists in certain highly regulated sectors -- such as financial services or government -- spent much time evaluating regulatory issue...

Are You Ready for E-Discovery?

If you're like most of us in IT, you probably have a relatively small number of individuals in your firm that you're used to working with fairly closely. For example, if you're a development manager, you probably work closely on a daily basis with the business folks to understand their requirements ...

How confident are you in the reliability of AI-powered search results?
Loading ... Loading ...

E-Commerce Times Channels