Posts tagged “ClearPath”
Thursday, April 10th, 2014
Over its 23-year history, the RSA conference in the USA has grown to become the largest gathering of security professionals in the world. In the spirit of sharing, learning, and securing, I offer here a few of the thought-provoking ideas from the conference.
Thursday, April 3rd, 2014
Too many applications on which we as societies depend are not good enough: difficult to use, poor performance, insufficiently secure.What can be done to improve the quality of IT applications that form an increasingly important part of our lives? What research would be useful in pursuit of that goal?
Wednesday, March 26th, 2014
What is a bollard and why are we discussing salad greens in a security blog? Bollards are part of the physical security landscape, and although we focus on technical security, physical security is indispensable in the total security picture for a data center.
Wednesday, March 19th, 2014
Why do businesses struggle to execute their plans? The major reason is that obstacles to success are not reported and removed, and therefore impede progress and implementation. Part of the responsibility lies in a human reluctance to give management bad news.
Wednesday, February 26th, 2014
The answer to the question, “Whatever happened to B1?,” is that B1 is alive and well in OS 2200 and provides the foundation for today’s OS 2200 security.
Tuesday, January 21st, 2014
IT is a global business: the need to communicate clearly has never been more important.
Tuesday, December 17th, 2013
Christmas is nearly here again so it’s time to catch up with what’s going on at SantaPrise and its IT division, SantaSystems. I met the CIO Elf Tietokone recently and, after a sauna and a glass or two of glögg, he told me what has been going on during the year – and a very busy time it has been.
Tuesday, November 26th, 2013
Flash drives, so convenient for carrying data from one computer to another, pose a security risk as soon as you insert one into a USB port.
Tuesday, November 5th, 2013
Hardly a week goes by without a report of some security breach. These are increasingly sophisticated attacks organised by criminals and even governments. It’s not surprising that security has risen high up the list of concerns of CIOs and other senior management.
Friday, September 27th, 2013
Halloween is a few weeks away, and it’s time to start working on costumes for the kids. Be careful! The scariest creatures aren’t ringing your doorbell and calling “trick or treat” – they’re sitting at computer terminals and living off your credit cards!