Security in our modern times and my final thoughts. This is a continuation of my other “Security in our Modern Times” post that can be found here and here and this story has gotten to a point where you just cannot make this up. So let me give you the Reader’s Digest review of the story and then give you my opinion on the latest twist and see if you agree with my opinion.
TVP Tag Archives
Security in Our Modern Times, Part 2
Welcome to my second part of the conversation on security in our modern times. In my last post, I left off talking about the U.S. Government’s court order complying Apple to develop a solution to open the phone for the investigation into the attack that happened in San Bernardino, California.
Security in Our Modern Times
Throughout all the years I have been working in information technology, security has been an area that engineers have striven to improve. As a result, we have make our environments as secure as possible. We have always looked to make the security of our systems stronger. Security has evolved over time. One example of this evolution is the …
Dell + EMC = Less Security?
Dell has announced it will spin off its SecureWorks product portfolio. SecureWorks is very late to the cloud and virtualization security market, and it may never get there. EMC RSA ignored the cloud and virtualization security market and now is struggling to find a footing in the larger IoT market. VCE has no security reference …
Will Technology Be Our Ultimate Downfall?
Question of the day: Will technology end up being our ultimate downfall? In the not-so-distant past, I wrote a series of blog posts on the expectation of privacy with user device tracking. If you are interested, you can check them out here. Lately, there have been a few things in the news that make it …
Continue reading “Will Technology Be Our Ultimate Downfall?”
Application Security: What Is the First Step?
What is the first step of application security? What is this step regardless of whether the process involved is DevOps or traditional silos? We have heard many answers before, such as architecture, code analysis, hardening, risk analysis, etc. But we have not really talked about the intersection of the user, application, data, and system. Perhaps …
Continue reading “Application Security: What Is the First Step?”