This feature first appeared in the Summer 2014 issue of Certification Magazine.
Criminals lurk in many of the Internet’s dark corners, scouting out victims and eager to pounce whenever they identify a network vulnerability. Organizations that fail to apply basic security controls to their networks face a multitude of risks from anonymous attackers, including theft of …Read Article
Sometimes finding out about a cybersecurity vulnerability is like seeing a mouse in the kitchen. Before it happens, both businesses and home computer users tend to assume that their IT security is entirely shipshape. If you haven’t seen any problems, then why would you assume that problems exist, right? You only start asking questions after you …Read Article
In an article penned for Certification Magazine last month, I spent some time speculating about the next version of Microsoft Windows, the beta release of which was due out Sept. 30. In that article, I pieced together all of the rumors and speculation to try to form a coherent picture of what this …Read Article
The term Internet of Things, or IoT, was coined in 1999 by Kevin Ashton. Ashton, a British technologist who co-founded the RFID-pioneering (radio frequency identification) …Read Article
Windows 8 has been with us for a couple of years now and its reception in the marketplace has been tepid at best. A lot of users found the interface changes in Windows 8 to be unpalatable. In fact, many users elected to keep the familiar environment provided by Windows 7 on their desktops, and …Read Article
The convenience and ubiquity of wirless internet access ensures that an ever-increasing number of people have a tablet, smartphone or other personal electronic device with them just about everywhere they go. And using those tools in the performance of everyday workplace tasks has become so common that we have an acronym for it: BYOD, or Bring Your Own Device. …Read Article