Recent Posts

Enterprise Networking Vendors Prepare for Disruption

David H Deans
The introduction of open source software platforms and bare-metal systems into the legacy enterprise network realm will eventually disrupt the status-quo for leading vendors that have previously benefited from the lack of unruly innovation. Meanwhile, established vendors can still take advantage of the apparent resistance to change within many traditional IT organizations that depend upon the conservative leadership of cautious CIOs.
Enterprise Networking Vendors Prepare for Disruption

The Keys to Managing and Using Company Passwords

Rick Delgado
Improving your business’s security is certainly not easy, but it’s best to start with what many consider the first line of defense. Passwords can protect your accounts and business data, but only if they’re used effectively. Hackers like an easy target and having difficult-to-crack passwords can persuade them to look elsewhere.
The Keys to Managing and Using Company Passwords

A Cautionary Tale: Are You Clicking Your Privacy (or the Privacy of Others) Away?

TamaraDull
The big data privacy discussion is subtle, complex and complicated – and we each have a role to play. What’s yours going to be? This is my adapted version of the popular "Feathers in the Wind" tale attributed to Rabbi Levi Yitzhak of Berdichev.
A Cautionary Tale: Are You Clicking Your Privacy (or the Privacy of Others) Away?

Whose Story Are You Telling?

TamaraDull
You have limited (if any) control over what others share about you, but you do have control over what you share about yourself and others. Just because you have someone’s personal information doesn’t mean you have to share or act on it. Remember: It may not be your story to tell.
Whose Story Are You Telling?

The Snappening: Over 200,000 Snapchat Photos Leaked Online

larrykim
Hackers leaked 200,000 photos of unwitting Snapchat users to popular websites 4chan and Reddit. Many of the photos are reported to contain nudity of minors.
The Snappening: Over 200,000 Snapchat Photos Leaked Online

The Impact of Wearable Technology on Workplace Security

Rick Delgado
There’s no avoiding the clear trend that will come as the general public adopts wearable technology. The risks that accompany wearable devices are real, but they can be managed by the company willing to prepare for what’s to come. Common sense approaches and the latest security technology can go a long way to ensure a company’s data is protected. Once preparations are complete, businesses can proceed to reap the benefits that wearable technology brings.
The Impact of Wearable Technology on Workplace Security

Dear Facebook, It’s Not You, It’s Us

TamaraDull
Dear Facebook: The fact is that without all this data—my data and the data of my 1.3+ billion “friends” on Facebook—you would shrivel up and die. You need our data to stay alive.
Dear Facebook, It’s Not You, It’s Us

We’re Traveling at the Speed of Cool to Creepy

TamaraDull
It is no longer good enough to make the connection or get the account. The challenge now for companies/brands/apps is to demonstrate that they are trustworthy, respectable, and care about safeguarding what customers have shared with them—i.e., their personal data.
We’re Traveling at the Speed of Cool to Creepy

Protecting Your Brand: The State of Social Infrastructure in the Enterprise

PaulDunay
Welcome to another Social Media Today webinar as part of our Best Thinker webinar series, this time on the topic of Protecting Your Brand: The State of Social Infrastructure in the Enterprise.
Protecting Your Brand: The State of Social Infrastructure in the Enterprise

How to Respect and Protect Your Users’ Privacy in the Internet of Things

PatrickSalyer
Notify your customers that you will protect their data privacy by stating clearly what you will do with the data collected by a device connected to the internet of things and how you will secure their data. For example, Preventice, maker of the BodyGuardian wearable device for people at risk of heart attack, clearly states its security strategies on its website.
How to Respect and Protect Your Users’ Privacy in the Internet of Things