Doug Vitale Tech Blog

Latest IT news and commentary

The Pentagon Still Doesn’t Encrypt Its Emails

Mother Jones, 31 Mar 2017 – A year and a half ago several US government agencies weren’t using basic, easy-to-implement, encryption technology, failing to protect their employees emails traveling across the Internet. At the time, the Army, the Navy, and even the CIA and FBI didn’t use the widespread email encryption technology known as STARTTLS. Since then, the FBI, NSA, CIA, and the Department of Homeland Security have all adopted it. But the Defense Information Systems Agency or DISA, the Pentagon’s branch that oversees email through the mail.mil service, still has not, according to an online testing tool. [More]


9 biggest information security threats through 2019

CIO, 28 Mar 2017 – The information security threat landscape is constantly evolving. To help you navigate the terrain, each year the Information Security Forum (ISF)puts out its Threat Horizon report to provide members with a forward-looking view of the biggest security threats over a two-year period. What follows are the nine biggest threats on the horizon through 2019 that your organization may have to manage and mitigate. [More]


Continuous IT audits are needed to combat today’s cyber threats

CSO, 27 Mar 2017 – Our CEO recently decided it was time to offer a continuous total audit solution. As you know IT audits are often done on a yearly basis and that leaves IT departments scrambling to fix everything once a year. Imagine an IT audit that starts with an initial risk assessment that determines the yearly continuous audit plan? Enter continuous auditing. For a little more than the cost of a yearly audit that only looks at your People, Process and Technology once a year, now audit teams can be engaging with your IT team monthly. [More]


Content-Centric Networking: A Better Way to Organize the Internet

IEEE Spectrum, 23 Mar 2017 – The Internet is more than 45 years old, and it’s starting to show its age. To be sure, it has served us wonderfully well. Today, however, all of those users demand a level of performance that the Internet was never designed to deliver. [More]


Guide to Implementing the Top Ten Security Principles for Business

Security Compass, 17 Mar 2017 – It’s more important now than ever to run a business securely, but with threats becoming more common and complex every day and countermeasures always shifting, it can be difficult to know how to start building an effective information security practice. In order to help, we at Security Compass’s advisory unit distilled the most critical measures into ten security principles that every business should follow. [More]


Archive (search for keywords with site search engine)

2017
January – February 2017

2016
November – December 2016
September – October 2016
July – August 2016
May – June 2016
March – April 2016
January – February 2016

2015
November – December 2015
September – October 2015
July – August 2015
May – June 2015
March – April 2015
January – February 2015

2014
November – December 2014
September – October 2014
July – August 2014
May – June 2014
March – April 2014
January – February 2014

2013
November – December 2013
September – October 2013
July – August 2013
May – June 2013

Written by Doug Vitale

July 31, 2013 at 12:13 PM

%d bloggers like this: