Our Top 5 Posts of 2014: Day 1 – December 27, 2014 – in fifth place: Another UPS email Scam Day 2 – December 28, 2014 – in fourth place: SDLC For Cloud Computing Day 3 – December 29, 2014 – in third place What is Access Management and Why is it Important Day …
In a move that really confuses all the formerly stated cautions about using connected mobile devices while in-flight on a plane, this from The FAA. FAA to lift mobile shut-down rule | ZDNet. Thanks to ZDNet
Hybrid clouds pose new security challenges – Network World. The “Crazy Quilt” of hybrid cloud computing gets even crazier and more complicated. Talk about too many moving parts! First, the generally accepted definition of hybrid cloud includes a mixture of hardware, applications, and data resources physically located in a company data center as well as …
A Handful of 2012 Privacy & Security Predictions : Info Law Group. Verrrry Interesting!!!
The real force behind the consumerization of IT | Consumerization it – InfoWorld. And it is no wonder that security has become a much more critical issue for companies. And decentralizing company IT resources to Cloud Services shifts infrastructure security responsibility to the Cloud vendor. It also eliminates the one-size-fits-all approach to remote devices. Laptops …
Cisco, Juniper, Check Point, Palo Alto among firms in security contest – Computerworld. The big guys battle it out. Email me if you are interested in learning more about Palo Alto Networks. firstname.lastname@example.org
GAO makes 105 recommendations to patch IRS information security holes – FierceGovernmentIT. We can’t expect perfection when it comes to privacy, even with our Federal information systems.
The Cloud is Huge!: Facebook adds “app” passwords to site security – Yahoo! News.
Cybersecurity breakthrough keeps sensitive data confined in physical space | ScienceBlog.com.
Congress Concerned About Security In Kindle Fire’s Web Browser » Android Phones, Android Tablets, News, Tech, Gadgets And More, Thedroidguy.