May 22, 2012

Making the Most of Social and Professional Networking

As social/professional networking continues to proliferate, users and organizations alike, seek to find the ways to make the most of the growing trend.  A recent infographic shows […]
March 31, 2012

Managing Your Personal Security

In the past few days, we learned that Global Payments Inc, a middle-man credit checking company, suffered a breach of its systems starting in January of this […]
November 30, 2011

The Privacy and Security Implications of Misusing Technology

If you haven’t already heard of Carrier IQ, you need to do some serious web searching, as they are swiftly becoming the new name in technology misuse […]
October 29, 2011

My Workplace Technology Wish List

It is not every day that one gets an opportunity to put together a wish list of technology solutions that could be used to drive a […]
October 15, 2011

Guess What? Technology is not easy

It might seem that way because of how ubiquitous it is, but technology is not really easy.  Lots of time has been spent trying to hide […]
August 21, 2011

Managing a Garden

Since May of this year, we have started a little “Green Grocer” project (as my neighbor likes to call it).  It started out from four (4) seedling […]
July 13, 2011

Where Netflix Went Wrong: Corporate Communications

The good folks at Netflix recently announced a huge price hike for their customers, as they separate their DVD and streaming businesses into distinct product offerings.  If […]
June 29, 2011

Effectively Managing Risk

Despite the significant uptick in information security events on display thus far in 2011, and despite the diversity and caliber of organizations that are being breached, […]
June 9, 2011

To Disclose or not to Disclose

…that is the question. Every time a software vendor experiences a vulnerability or releases patches for a serious security issue, the debate about Full Disclosure or […]
May 31, 2011

Just ask Sony…

Why should you take your organization’s information security posture seriously? Just ask Sony.  It has been estimated that Sony will spend more than $170 million dollars due to […]
May 3, 2011

Managing Technology-based Risks

Risks exist. You would think that this is so obvious as to not need saying, but too many people appear to operate as though downplaying or […]
April 29, 2011

Reactive Security: Feel the pain in 2011+

We are only one third of the way into 2011, but we have had some of the largest information security breaches of the decade – and […]
April 30, 2010

Apple vs Adobe = Pot vs Kettle

It is quite amusing to see Apple and Steve Jobs go out of their way to lambast Adobe about the “closed” platform of Flash, and to suggest […]
May 3, 2010

The Job Hunting Conundrum

Based on a number of surveys taken since the recent economic downturn began, it would appear that there is a fairly substantial disconnect between how employers […]
May 6, 2010

Making Business Sense

Long ago, in days or yore, it was common to complain that most information technology leaders and staff were too focused on deploying cool technology just […]
May 10, 2010

It’s Time to Re-evaluate Host-based Security

I’ve said it for a few years now, but host-based antivirus is really not working out anymore.  Not with its reliance on signatures to detect malware. […]
January 31, 2011

Why Your New Technology Purchase Might Disappoint

Technology continues to provide many benefits for individuals and businesses, and our increasing dependence upon it is a testament to its overall usefulness.  Each day, many, […]
February 15, 2011

Why Your New Technology Purchase Might Disappoint – Part 2

Last time, I mentioned that inadequate planning is one of the key reasons why your new technology purchase might prove to be disappointing.  This is true […]
March 31, 2011

Maintaining Good Security Practices

Security is not just a state of being. We are often called to provide an assessment about our present security posture, and usually, the person asking […]
April 29, 2011

Reactive Security: Feel the pain in 2011+

We are only one third of the way into 2011, but we have had some of the largest information security breaches of the decade – and […]
May 3, 2011

Managing Technology-based Risks

Risks exist. You would think that this is so obvious as to not need saying, but too many people appear to operate as though downplaying or […]
May 31, 2011

Just ask Sony…

Why should you take your organization’s information security posture seriously? Just ask Sony.  It has been estimated that Sony will spend more than $170 million dollars due to […]
July 13, 2011

Where Netflix Went Wrong: Corporate Communications

The good folks at Netflix recently announced a huge price hike for their customers, as they separate their DVD and streaming businesses into distinct product offerings.  If […]
October 29, 2011

My Workplace Technology Wish List

It is not every day that one gets an opportunity to put together a wish list of technology solutions that could be used to drive a […]