Entries by System Experts

Protecting Systems and Data for a Traveling Workforce is Crucial

by Samuel Greengard, writer, Security Roundtable, January 24, 2018 Mobility is at the center of today’s enterprise. Employees rely on smartphones, tablets, and personal computers to access data anywhere and at any time. It’s no news flash that these devices are now a critical piece of the enterprise productivity scheme. Yet, all the gain doesn’t come without some pain: […]

The Internet of Things: Still Lots for You to Learn

by John Edwards, InformationWeek, January 11, 2018 IT groups will need to provide architecture, data-mining tools and connectivity, while giving business groups the freedom to innovate on their own with the Internet of Things. The Internet of Things (IoT) is already making a significant impact in a variety of business areas, including industrial monitoring and […]

Is a Cyber Pearl Harbor a Real Threat?

by Samuel Greengard, writer, Baseline, December 12, 2017 In recent weeks, U.S. financial institutions such as JP Morgan Chase, Capital One and Wells Fargo have undergone sustained cyber-attacks from sources that security experts say could be a hostile foreign government or terrorist organization. Some experts, including Defense Secretary Leon Panetta, have cautioned that this distributed […]

Cloud security and IoT are the new peanut butter and jelly

by Christine Parizo, writer, Tech Pro Research, October 2017 For enterprises using cloud services with IoT, it’s critical to adhere to as many security practices as possible. Experts weigh in on the best approaches to take. The Internet of Things (IoT) adds another sticky layer to the question of cloud security. Most organizations think in […]

Fighting Cyber-Threats With Innovative Tech

by Samuel Greengard, business & technology reporter, Baseline, Oct. 24, 2017 Increasingly sophisticated and dangerous cyber-threats require more innovative security approaches, including advanced automation tools, AI and blockchain. The complexities of today’s cyber-security environment aren’t lost on anyone. It’s increasingly difficult to spot threats, detect intrusions, and thwart hackers and cyber-thieves. “A cruise through the […]

No Compromises with the Latest Cybersecurity Threats

by Samuel Greengard, business & technology reporter, ChannelProNetwork, Sept. 8, 2017 Business process compromise attacks represent a growing risk. But channel pros can help their clients address the problem. AS THE DIGITAL AGE UNFOLDS, it’s increasingly clear that the weakest link in cybersecurity is humans. People click bad links, open infected files, and succumb to […]

Ethical hacking: At WPI, a search for computer vulnerabilities

by Kaitlin Milliken, Correspondent, Worcester Telegram, July 16, 2017 WORCESTER – Students participating in Worcester Polytechnic Institute’s Cyber Security Club stare at their laptop screens, typing long lines of code. They hope to find vulnerabilities in software and hack into a computer system. Each task they complete earns points. Alex Gaines, president of the club, […]

Security Experts Share Top Tips for Protecting Unstructured Data

by Nate Lord, Digital Guardian, May 22, 2017 19 security professionals and business leaders share their top tips for protecting unstructured data. From the contents of emails to intellectual property, business plans, proprietary training documentation, and much more, most enterprises manage vast amounts of unstructured data containing valuable and sensitive information. The sheer volume of unstructured […]