• May 19
    2017
    Pundits and commentators are concerned that automation is eliminating jobs, and some say it is happening at an unprecedented rate. An article in the New York Times last December captured the widespread worry. Its title: “The Long-Term Jobs Killer Is Not China. It’s Automation.” You only have to look around to see what kinds of jobs are being lost to automation. Taxi drivers are being replaced by ride sharing services. ...
  • May 09
    2017
    The 2017 Data Breach Investigations Report is out. Verizon Enterprise Solutions performs a service to the community by publishing this report every year. It is one of the most comprehensive reports of its type that I have ever seen. This year’s compilation covered 42,068 incidents and 1,935 breaches. I advise you to visit http://www.verizonenterprise.com/verizon-insights-lab/dbir/2017/ and download the entire report, but I wanted to pull out one or two highlights that ...
  • May 03
    2017
    Last month Logical Operations joined the IT Certification Council, an organization focused on growing and promoting professional certifications in IT. It establishes industry best practices, markets the value of certification, enhances exam security, and works on other issues connected to certification. At Logical Operations, we believe in professional certifications, and we’re glad to have the chance to work with industry leaders on the issue. I think the value of certification ...
  • Apr 25
    2017
    Here are five urgent questions for organizations concerned about cyber security right now: Can your solution provider help you navigate the perilous road to compliance? What’s your strategic incident response plan to a data breach? What emerging risks threaten IoT and big data? What countermeasures and new technologies can protect against those risks? How can you keep insider threats outside? As it happens, those topics (and others) will be the ...
  • Apr 19
    2017
    A recent opinion piece in Computerworld by Ira Winkler asks, “What prevents breaches: process, technology or people? One answer is PC, and one is right.” Most people — and most security experts — when asked the most important element in cyber security will say “people.” Winkler says it’s not people, it’s process: “Before you can focus on the people in a security program, you must be able to define exactly ...
  • Apr 04
    2017
    There are millions of mobile apps available now through the Apple App Store, Google Play, and Windows Phone Store. But the major commercial app outlets are only part of the story. Increasingly, organizations are harnessing employee connectivity by creating their own proprietary mobile apps. Organizations find that developing a mobile app is a lot like developing a traditional desktop app, in that best practices include start with security in mind, ...
  • Mar 22
    2017
    The 2017 Thales Data Threat Report was published last week. It was compiled by 451 Research for Thales eSecurity. Based on a survey of more than 1,100 senior security executives all over the world, it found that nearly three-quarters (73%) of respondents say they are increasing spending on cyber security in the next year. That is up from 58% reporting increases last year. You can download the entire report here. ...
  • Mar 14
    2017
    Browsing the web on the topic of “lifelong learning” recently, I came across an article by Nancy Merz Nordstrom: “Top 10 Benefits of Lifelong Learning.” These benefits she lists are all pretty much what you would expect. Lifelong learning promotes self-fulfillment; it opens your mind, increases your wisdom, helps you adapt to change, helps you find meaning in your life, and so on. The article didn’t explicitly touch on what ...