We tend to design things that are complex, and that can be our undoing.
Computer security does not come easily. It requires awareness of the ways in which computers and data are compromised. To guard against loss, there are 5 key things you should know. 1. Anti-virus programs are essential, but they’re not enough. Anti-virus programs will not keep you safe from all attacks. They are good for blocking […]
The perennial problem of data storage and data access has a number of new aspects since cloud computing has come along. This article is a review of some of your data storage and access choices.
“The Cloud” refers to computers, storage and software connected to the Internet and accessible via the World Wide Web. The first question you may have about the cloud is whether your data is safe there.
What makes software insecure? What vulnerabilities are there in software? Why are they always discovering new holes & vulnerabilities in our software and systems? Doesn’t testing take care of these problems? What’s an enterprise to do about insecure software?
Once we get over our wonder at the broad capabilities of software running on modern computers and devices, we begin to ask why so much of the software we use is of questionable quality. Between vulnerabilities to malware and constant updates to correct problems, it seems that software is never stable and reliable. Why?
Risk management is a key area for financial leaders. When we look at IT development projects, we’re usually focused on opportunities rather than risks. But IT investments have risks beyond security and privacy issues. Project failure can lead to losses even beyond the intended investment. Here are seven ways to look at IT development projects from a risk management point of view.