dcsimg

Internet of Things 101 – IoT Device Authentication Explained

Readers of previous posts are aware of my reservations on the current ubiquitous drive to connect absolutely everything (from the frivolous to the useful) to the internet but there is no denying that the trend will continue unabated. This will create security risks that need management.  … [Read more...]

What UK Businesses Must Know About GDPR and Brexit

Regardless of industry, companies are subject to data protection laws according to their jurisdiction.  … [Read more...]

How to Choose the Right Managed File Transfer Architecture

For the purposes of this post, we are concerned with two relevant options, namely File Transfer Protocol (FTP) and Managed File Transfer (MFT). The second, being managed, obviously offers more features than a standard file transfer solution. But, which offering is best for your company? … [Read more...]

The Evolution of Integration and the Rise of Middleware

Back in the early Jurassic era, when Windows NT Server was the OS of choice, an earlier enterprise employer of mine was considering a company-wide change to Windows XP. Unfortunately, this wasn’t possible, and we remained on Windows 2000. Why? Because the entire production process from raw materials to shipment was connected to both SAP and Filemaker Pro. … [Read more...]

Is Java Actually Dying?

There has been a lot of hate towards Java over the years, but there are just as many proponents for the programming language. Here is why Java isn't going anywhere. … [Read more...]

IoT Security: What is It, and Why Does It Matter?

You may consider ‘IoT security’ an oxymoron and, unfortunately, for many IoT devices, you’re quite correct. The IoT and security don’t necessarily go together, with many companies and domestic consumers using IoT devices that lack fundamental layers of security. This obviously isn’t ideal. … [Read more...]

Smart Speakers 101: Google vs. Amazon and The Rest

AI (artificial intelligence) is all the rage these days. Hardly surprising, when you consider that natural intelligence seems to get even rarer as the years march swiftly onwards. … [Read more...]

Why User Agreements Are Killing our Privacy 

Online privacy is a mythical creature not unlike the unicorn or Cyclops—we’ve all heard the tall tales, but we’ve never seen it in the wild. And we have only ourselves to blame. If we take governmental monitoring as a given and add the fact that U.S. ISPs can now monetize their customer’s service usage without permission, is there any expectation of online privacy left? … [Read more...]

How Likely Are You to Lose Your Job to a Robot?

If some comedians speculate that women only tolerate men only because replacement devices can’t buy them dinner, perhaps employers of the future will be as logical when allocating robotic resources to their workforce? … [Read more...]

Digital Threats to Democracy—Real and Imagined

Democracy is in many ways about protecting freedoms, the freedom of the press, the freedom to bear arms, to arm bears, to vote in elections, and much more. With the advancement of technology, many feel these freedoms are under threat and the alleged Russian interference in the last U.S. presidential election has brought the subject under intense scrutiny. … [Read more...]