Blog

Another day, another data breach. And even as IT experts, how many of us feel confident that we know who has our data? And which data? The revelation that your Facebook information was a factor in a number of elections has to make you wonder and perhaps, worry. Even if we aren’t guilty of “over-sharing,” you can discover that many sites change their privacy settings frequently, thus putting the onus on you to constantly monitoring the settings on all the sites you go to. Who has time?…

Read Full Article →

Just recently IBM unveiled two miniaturized mainframe models, dubbed skinny mainframes,that are easier to deploy in a public or private cloud facility than their more traditional, much bulkier predecessors. Relying on all their design tricks, IBM engineers managed to pack each machine into a standard 19-inch rack with space to spare, which can be used for additional components…

Read Full Article →

When asked where our corporate data resides, the answer seems simple … On disks if the data is current and on tape if it is archived. While this is true, it isn’t a complete picture, and might lead some to believe that their data is secure as long as their data center is secure. This first view is called “data at rest,” and the word “rest” means that at this point in time, no one is accessing it. It is secure because no one is touching it…

Read Full Article →

Ask anyone why they want something new and you’ll usually get the same answer: New is the latest and greatest, new has advanced features, new is cooler than old. This state-of-mind is reinforced by social pressure and technical prejudice. "What, no face recognition? That’s so iPhone 8." This aspect of human nature isn’t new. Fashion has driven buying decisions for thousands of years…

Read Full Article →

I’ve talked with many banking executives about how their business is changing and what they need to do to compete in this dynamic and turbulent marketplace. Maintaining trust with clients is core. The financial services sector had 65 percent more cybercrime attacks than average, based on an analysis of security incidents from 2016. In this digital age, customer expectations are incredibly high with respect to security and personalized services. These attacks can put trust at risk. Once that trust is gone and customer confidence is lost, the company’s future is in jeopardy…

Read Full Article →