"None" news, interviews, and features

News about None

  • Time for a Switch

    Speeds and feeds as an Ethernet differentiator are over. Ethernet macho will be based much more on offering adaptable consumption models than raw throughput.

  • Choosing the cloud that's right for you

    Not every organization has moved its IT operations to the cloud, nor should we expect that to be the case. There are legitimate reasons to adhere to the on-premises IT approach, not the least of which is the fact that it assures that your IT infrastructure and all the data in it is under your control.

  • 7 warning signs an employee has gone rogue

    For all the emphasis on tools and gizmos, IT is still very much about the people who develop and use said tools and gizmos. Collaboration, mutual respect, passion for the work -- all this and more are essential to a beneficial outcome, whether your IT group is shipping code, swatting bugs, working with business users, or securing company systems.

  • Federal IT projects need critical care

    Federal IT projects have hit the critical care list all too often and now watchdogs at the Government Accountability Office have moved those undertakings to its <a href="http://www.gao.gov/products/GAO-15-290">High Risk List</a> which means Congress and the executive branch should take an extra special look at the situation.

  • OK, BlackBerry, what else have you got besides security?

    BlackBerry's pitch to get back into the warm embrace of corporate IT shops seems logical enough at first glance: We're the most secure in mobile. Mobile is where all of your data and interactions are heading. Therefore you should give us all of your corporate business.

  • Apple Pay rival MCX defends security after hackers steal emails

    The Merchant Customer Exchange (MCX), a consortium of 58 major U.S. retailers whose mobile payment network will take on the new Apple Pay early in 2015, today held a hastily-organized news conference to address questions about a hack that pilfered consumer email addresses.

  • Detoured by Shellshock and Poodle

    As I moved into the information security position at my new company a few weeks ago, I was anxious to do a full assessment of our security defenses. But I was immediately sidetracked by, not one, but two major vulnerabilities that couldn't be ignored. Those were fires that had to be put out before I could do anything else.