Search Results

Results 1-4 of 4 for Patrick Sweeney
EXPERT ADVICE

Securing SCADA Systems: Where Do We Start?

Many leading industrial and governmental network infrastructures employ supervisory control and data acquisition (SCADA) and distributed control systems (DCS) to automate, monitor and control crucial physical processes, including manufacturing and testing, electrical transmission, water and fuel transport, and traffic signal operation. ...

EXPERT ADVICE

The Top 3 Tech Trends Shaping 2011

Three overarching, interrelated trends -- cloud consumption, virtualization and mobility -- present themselves as key industry themes for 2011. All have been increasing in importance over several years, and this year, all will reach a tipping point for businesses and information security providers alike. ...

EXPERT ADVICE

10 Best IT Practices for Smartphone Security

The use of smartphones as business tools has reached a tipping point. Soon, mobile phones will overtake PCs as the most common Web access devices worldwide. As a result, employees will look less to corporate IT as a source for technical leadership. As mobile phones provide cutting-edge smartphone technology, employees will look to consumer-oriented vendors that cater to their own personal needs, rather than those of their employers.

EXPERT ADVICE

The Promise and the Peril of Web 2.0

Web 2.0 enables companies to build dynamic networking communities and foster ad hoc collaboration among employees, customers and partners. This can be great for businesses, as they can gain insights and feedback in hours instead of weeks or months. However, the trusting, collaborative and open nature of the Web 2.0 environment is precisely what makes it ripe for malicious exploitation. ...

How often do you receive an email that you suspect is fraudulent?
Loading ... Loading ...

E-Commerce Times Channels