Quick Post
markpainter
New technologies serve to increase productivity and can improve a myriad of things. However, new technology invariably comes with a hidden security cost. To wit…
(4)
   
(2) (2)
Joel Shore  Most of the home-automation gear currently in the field (lighting control and HVAC) were conceived long before security … more »
JoelShore
Paul Korzeniowski
Paul Korzeniowski
blaberis
@genedelibero
I know I’m not alone when I say that as a CIO, I’ve come across more than my share of unauthorized applications running in the cloud. There’s constant pressure …
(12)
   
(3) (3)
Joel Shore  All IT is a security breach waiting to happen, cloud or not. Yes, cloud has its own unique security concerns, but so do … more »
JoelShore
Paul Korzeniowski
Paul Korzeniowski
JohnFMcDermott
@genedelibero
@genedelibero
jdodge
How do you assess technology risk? When do you assess it? There's plenty of methodologies that do this and I've linked to a several documents below, one a risk …
Would you like to comment on this content? Log in or Register
HP Security Strategists

By HP security strategist Cindy Cullen

(1)
   
Joel Shore  This is likely where we need to go. Clearly, protection levels for programs and for data have repeatedly been shown to b… more »
JoelShore