Posts By Author:
About the Author
Dr. Newton has contributed to advanced computer architecture and operations management projects. He helps define the direction for ClearPath and Forward! security.
ClearPath OS 2200 Security Explained
This blog is about another enhancement in Release 17 that is not a product feature but a high-level explanation of the security philosophy, goals, and features in ClearPath OS 2200.
Posted by: Dr. Glen E. Newton on December 7th, 2016
ClearPath OS 2200 Release 17 continues the progression of features that you can use to secure your systems and data. Here are a few of the highlights.
Posted by: Dr. Glen E. Newton on October 5th, 2016
Words of the Day: MAC and DAC
This blog explores the topic of access control and its method of protection.
Posted by: Dr. Glen E. Newton on April 14th, 2016
Protecting Your PII
Protecting PII from unauthorized access is an essential part of every company’s security policies, because when PII is revealed to unauthorized users, it often appears in the news media.
Posted by: Dr. Glen E. Newton on February 26th, 2016
Word of the Day: PII
What can you do to ensure that your customers can trust you with their PII? Here are a few suggestions...
Posted by: Dr. Glen E. Newton on October 23rd, 2015
The scariest creatures aren’t ringing your doorbell and calling “trick or treat” – they’re sitting at computer terminals and living off your credit cards!
Posted by: Dr. Glen E. Newton on September 10th, 2015
Apex reporting, included in ClearPath OS 2200 Release 16.0, help support a “defense in depth” strategy and facilitate compliance with policies, regulations, and standards.
Posted by: Dr. Glen E. Newton on March 18th, 2015
With over 80% of the cell phone market using some level of Android operating system, Android phones are a particularly fertile ground for cyber-criminals. Dr. Newton offers some suggestions for protecting yourself from cellphone malware.
Posted by: Dr. Glen E. Newton on November 20th, 2014
Who Was That Masked Man?
The nightmare of identity theft affects tens of millions of people every year. It disrupts lives, damages reputations, creates financial loss, and provides a cloak of anonymity to criminals.
Posted by: Dr. Glen E. Newton on October 21st, 2014
Balancing security risk against business opportunity is an ongoing challenge. Today’s decision about which risks are high for you and which are low will no longer be appropriate when external factors change. That’s why you should plan to regularly re-evaluate your risk management decisions.
Posted by: Dr. Glen E. Newton on October 1st, 2014