On July 11, 2019 Mike Flasko, Director of Program Management, Information Management & Governance for Microsoft published “Announcing Preview of Azure Data Share”“. As Eldert Grootenboer writes for Infoq Azure Data Share “…provides [organizations] capabilities to share data [internally], as… Read more ›
When hackers obtain otherwise legitimate credentials to online sites and the data repositories they contain, the likelihood of success for their efforts to depart with data they do not own is much greater — perhaps unstoppable. Therefore it makes sense… Read more ›
ISVs with popular online computing offers (notably Apple, Google, and Microsoft) have each adopted and endorsed an “App” model. This writer has a lot of conceptual familiarity with Microsoft’s version of this approach. Microsoft has positioned its Office 2013 App… Read more ›
As both the number and intensity of successful attempts to subvert popular cloud, SaaS offers increases, some prominent industry experts are calling for mandatory two-step verification procedures. But, if past history provides us with any reliable metrics on the usefulness… Read more ›
Anyone following media reports on the security consciousness of consumers of online apps, or the disinterest they exhibit in developing one, will likely be familiar with what this writer considers a long term trend to look for “something easy” to… Read more ›
The Mashable blog has published a few articles on the online security flaws plaguing Microsoft’s Windows XP O/S. In Internet Explorer Gets Its Security Patch, and So Does Windows XP, Lance Ulanoff announced Microsoft’s intention to issue patches on Thursday,… Read more ›
Recent disclosure of additional details about the highly publicized compromise of Target’s customer data repositories support an argument for less manual effort to operate methods of securing confidential, user specific data, across online communications. Is this argument plausible? and, if… Read more ›
The stream of news about successful malicious attacks against online SaaS offerings — recently breaking at a non-stop pace — appears to me to be finally prodding the public to take, at a minimum, a more defensive stance about the… Read more ›
On Thursday, January 2, 2014, FireEye announced its acquisition of Mandiant. According to an article authored by Danny Yadron and published on the Wall Street Journal website titled CyberSecurity Deal: FireEye Buying Mandiant for about $1 Billion, the acquirer in… Read more ›
As data communications takes on an ever increasing set of mission critical roles for businesses of all types, and sizes, access to a method of simulating data communications problems, of all types (regardless of whether they arise from accidents, or… Read more ›