Allen Bernard is a freelance technology journalist, editor and business writer with 18 years of experience covering cloud, IoT, cyber security, networking, and many other tech topics.
This is the 2nd white paper I've done for the IoT Cybersecurity Alliance, an industry group made up of Symantec, Palo Alto Networks, AT&T, Qualcomm, IBM, Trustronic, and Nokia. The goal of the alliance is to lift the veil on IoT security so all can benefit from the potential of these exciting new technologies.
Worked with senior ABB management to produce a white paper explaining how digital transformation and collaboration can enhance productivity in the process industries.
Author's note: I worked with a group of 15 cyber security, networking, and IoT experts over a period of four weeks to create this paper.
Demystifying IoT Cybersecurity The Internet of Things introduces new vulnerabilities across the entire ecosystem. Here's what you need to know and prepare for.
The Internet of Things (IoT) is becoming ubiquitous as new and old devices plug into a variety of networks. From smart coffee makers in the kitchen to sensors em- bedded in 20-year-old motors on the factory floor, the IoT is expanding rapidly ...
As technologies go, augmented reality (AR) is not new, but it wasn’t until Pokémon GO exploded onto the scene this time last summer–quickly becoming the most used mobile app in history–that consumers and marketers were introduced to the potential of this revolutionary technology.
This is gated content on NetworkWorld. You'll have to enter your email address to see it ... but it's worth it! :-)
How IT departments are keeping the lights on while creating innovative development teams.
In the end, there is no one technology to "rule them all". The hardware, software, firmware, protocols, chipsets, applications, network architectures, devices, routers, cabling, switches, standards-setting bodies, politics, and so forth, it takes to the make the internet "faster" is mind-numbing.
On Thursday February 2 the IRS put out a press release warning schools, hospitals, restaurants, tribal groups and "others" to be on the lookout for sophisticated W-2 phishing scam that has netted crooks millions of dollars and cost employees, in some instances, their jobs. This diverse list of potential targets and "others" is of note because the W-2 phishing scam is growing in reach and effectiveness, hoovering up a larger and more diverse group of victims.
I created 37 cyber-security related articles for this project aimed at helping people stay safe online. We covered a range of topics from identity theft to the use of VPNs for for travel and remote working as well as detailing how USPS internal policies keeps vendor information safe and secure.
One of six case studies I did for TBM Council's 2016 TBM Awards -
Technology is the lifeblood of business at JPMorgan Chase, but the business viewed
IT as an expensive enigma with little relation to business value. The problem was not
the technology itself but the way IT and the business communicated about it, each
side talking past one another because they lacked a common language and context.
“The businesses were frustrated with the bills they’d receive from IT,” says Suzette
Unger, JPMorgan Chase’s CFO for Global Technology. “There was little translation
into business terms. They had no way to understand them or act on them.”
As the manufacturing world gets more connected with internet of things technology, security is fast becoming a front-burner issue.
This is why the Industrial Internet Consortium (IIC), an open-membership organization formed to accelerate adoption of the industrial internet of things (IIoT), created the Industrial Internet Security Framework (IISF), which published Sept. 19. Like other such frameworks, the goal of IISF is to provide cybersecurity best practices guidance to a swath of industry verticals and IIoT vendors as they move deeper into the hyperconnected world the IIoT represents.
iboss Cyber Security blog post -
Ever since Amazon jump-started the industry in 2006, companies have been moving workloads to the cloud in droves. And for good reason: cloud frees up tech resources for more business-facing activities, shifts spending from big dollar CapEx to more predictable OpEx, relieves the business of the burden of purchasing, provisioning, and maintaining costly infrastructure and software licenses … and on down the line.
iboss Cyber Security blog post -
In the good old days when shadow IT was just a piece of hardware or a few lines of borrowed code, CIOs
could expect their networks and infrastructures to be reasonably well-protected from all but the most determined foes.