No doubt you heard about the death of Google+? The reports of the death of Google+ are not exaggerated. But it’s an exaggeration to say that Google shut it down [...]
Hyperconverged and Hybrid Environments Consolidating desktop workloads in the datacenter using hyperconverged infrastructure and virtualization optimizes resources, reduces power consumption, and saves money. However, managing the complexity of a consolidated [...]
Cyberattacks On Nonprofits Today’s society is one where any organization operating online is theoretically at risk for cyberattacks. Such incidents could tarnish reputations, result in profit and data losses and [...]
Unlocking the cloud’s potential through greater visibility Cloud is becoming increasingly integral to the enterprise. The extent of this was illustrated recently when Microsoft reported quarterly revenues of $9.6bn for [...]
HIPAA Risk Assessment Guide Disconcertingly, one in four practices (25%) are failing meaningful use audits by the Centers for Medicare and Medicaid Services (CMS). The #1 reason for failure is [...]
Cloud Security Collaboration How Backups, Remote Wipes, and Other Features Keep Your Data Safe By now, you’re probably aware that cloud computing powers a lot of the tools and applications [...]
Remote Patient Monitoring The application of IoT in Healthcare services is bringing the paradigm shift in terms of how this industry operates, the accuracy of diagnosis and quality of treatment. [...]
DATA SOVEREIGNTY India is following Russia and others in imposing data sovereignty restrictions that specify that data must remain in country. Meanwhile the European Parliament has called for the suspension [...]
CISOs DevOps The marriage between DevOps and Security is rapidly gaining traction. Security is shifting from its former mindset of being its own silo to getting on the same agenda [...]
In the past few years, we have seen a surge of advancement in cloud development. New platforms, developer tools, and cloud services have become available, and developers have responded by [...]
Identity Assurance We believe that the reliable identity assurance (See part 1) must be built on three prerequisite principles as follows. Volition of the User – with Self-Determination, Identity authentication [...]
In an earlier article we discussed what technology can displace the password. The proposition of Expanded Password System (EPS) that we advocate is now acknowledged as a ‘Draft Proposal’ for [...]
Manage Data Breaches 2017 saw over 2 dozen major security breaches in 2017. While the public may have grown numb to the number and constant stream of data breaches reported, outrage [...]
Limitless Opportunities for IIoT Innovation Manufacturing has transcended its material nature and emerged in a new form that is partially virtual. Looking ahead a few years, the trend will continue [...]
Overcome the Misuse of AI Have you ever considered that the AI system integrated into your organisation’s computing infrastructure could possess a threat? What if it is indeed true? Will [...]
Explore top-tier education with exclusive savings on online courses from MIT, Oxford, and Harvard through our e-learning sponsor. Elevate your career with world-class knowledge. Start now!