The safety of the service most often cited as the culprit behind "shadow IT" is looking better after one of the world's best-known accounting firms clears it for international certification.
Some good, old-fashioned applied mathematics confirms what many online shoppers have always suspected: that their browsers may be doing the bartering for them, and not very well.
It goes against human nature to take a small risk in order to avoid the losses from a larger one. And that, says the world's leading security expert, leaves us unprepared for the worst.
A security conference is generally where you'd expect the keynote speaker to present something called a "solution." At this one, one of the most recognized names in the field was left wanting one.
"Workflow" sounds better than "itinerary," and that poetic lilt is important when trying to get your workforce on board with a tactical improvement program.
It was a small security conference, but I'll take it. It gives me time to listen to people in their everyday work whose business is suffering from a lack of healthy communication.
The tech press often waxes poetic about the latest clever, automated, exploit "bot." But a veteran security engineer uses the oldest tricks in the book to prove you don't need bots to take down a network.
Already, people are happy to give away elements of their personal data to private industries for marketing purposes. Why does the U.S. Government bother with eavesdropping for the same data?
Bloggers acting on public information do have a tendency to get the facts wrong. But Dropbox's effort to correct them, spearheaded by someone other than its PR team, pointed to some uglier facts.
Larry Dignan, ZDNet' s Editor-In-Chief, says enterprise mobility management is a thick soup of components that range from security to document management.