Posts tagged for “ClearPath”

Thinking Security: Who is That?

This is the 14th blog in a series about security and how security is about how you think.

Posted by: on March 11th, 2016

Protecting Your PII

Protecting PII from unauthorized access is an essential part of every company’s security policies, because when PII is revealed to unauthorized users, it often appears in the news media.

Posted by: on February 26th, 2016

Thinking Security: The Seven Goals of Security

This is the 13th blog in a series about security and how security is about how you think.

Posted by: on February 16th, 2016

Thinking Security: Usercodes, Passwords, and Certificates – Oh, My!

Now, I’m being overly paranoid here – it’s just a toaster, right? The data that the toaster has isn’t really mission-critical – but as we increase the value of the access and the data – we have to become more proactive with securing the credentials of the environment.

Posted by: on January 8th, 2016

Optimizing Santa’s Route … Quantum Computing?

Now that the year end is approaching, I decided to contact Elf Tietokone who, readers may recall, is the CIO of SantaSystems, the IT arm of SantaPrise in Lapland.

Posted by: on December 14th, 2015

Thinking Security: Is My Toaster a Security Risk?

With all of the “Internet of Things”, do I have to worry about new devices and how they affect the security of my house?

Posted by: on September 23rd, 2015

Thinking Security: A Five Step Program

This is the 7th blog in a series about security and how security is about how you think.

Posted by: on August 25th, 2015

Thinking Security: How Can I Do This?

In my last blog, I finished looking at my fictitious friend Pete’s report for the security of my house. That’s got me paranoid and thinking (or is that thinking and paranoid?).

Posted by: on August 5th, 2015

Yet Another Monumental Shift

We are announcing yet another monumental shift in technology, that of being able to run an MCP development image within a software defined container alongside the main MCP host environment in the fabric.

Posted by: on June 16th, 2015

Thinking Security: The Pete Test

People in the security area and security scanner programs are constantly adapting to the new vulnerabilities that are found and attacks that happen. We can use these external assessments to become more secure, and help our security mindset.

Posted by: on June 2nd, 2015

We use cookies on this site. By using this site, you agree to our use of cookies. To change or learn more, see our Privacy Notice.