Welcome Guest | Sign In
LinuxInsider.com

Results 1-20 of 136 for +Ed +Moyle (0.014 secs).

Searching: Articles | Discussions

Sort by Date | Sort by Relevance

Ed Moyle
Offsetting Asymmetry With Automation
11/24/17 6:00 AM PT | E-Commerce Times | 1048 Words

In the security world, there is a truism that defense (protecting systems) is harder than offense (breaking into systems) because it's...

Ed Moyle
'Invisible' Technologies: What You Can't See Can Hurt You
10/03/17 11:11 AM PT | E-Commerce Times | 977 Words

There are times when it seems like technology can work almost too well. Now, if working too well sounds to you...

Ed Moyle
The War Room: Experiential Security Planning
08/16/17 1:22 PM PT | E-Commerce Times | 1032 Words

Ask any security practitioner about ransomware nowadays, and chances are good you'll get an earful. Recent outbreaks like Petya and WannaCry...

Ed Moyle
3 WannaCry Talking Points to Win Security Buy-In
06/21/17 2:40 PM PT | E-Commerce Times | 1036 Words

By this point, most technology practitioners -- and nearly all security practitioners -- know about WannaCry. In fact, you might be...

Ed Moyle
Surviving the Security 'Skills Desert'
05/08/17 2:33 PM PT | E-Commerce Times | 1265 Words

If you've ever spent time in a desert, it may seem inconceivable to you that creatures actually can live there. The...

Ed Moyle
Intelligence-Driven Supply Chain Resilience
03/20/17 12:55 PM PT | E-Commerce Times | 1002 Words

It may not be apparent to all observers, but information security practices are undergoing a transformation. For at least a decade,...

Ed Moyle
The Old Man and the Tsunami: A Security Story
01/23/17 3:27 PM PT | E-Commerce Times | 995 Words

There's a folk-story that all Japanese schoolchildren learn about a man called "Gohei Hamaguchi" (sometimes called just "grandfather") who saves his...

Ed Moyle
Turning 'Shadow IT' into 'Better IT'
06/10/15 5:00 AM PT | TechNewsWorld | 1096 Words

There is an ancient Chinese proverb about a farmer who loses his horse. For those who haven't heard it, the story...

Ed Moyle
IoT: Why Security Pros Need to Prepare Now
04/29/15 8:59 AM PT | TechNewsWorld | 1142 Words

Have you ever heard of the Cullinan diamond? If you haven't, it was the largest diamond ever discovered: a 3106 carat...

Ed Moyle
Heartbleed: SaaS' Forbidden Experiment?
05/02/14 6:25 AM PT | E-Commerce Times | 1016 Words

Have you ever heard the term "The Forbidden Experiment"? If you're not familiar with it, it's a concept originating in the...

Ed Moyle
An SMB's Guide to PCI 3.0 Penetration Testing
02/04/14 5:00 AM PT | E-Commerce Times | 955 Words

By now, if you're an IT professional and you're in an organization that has the Payment Card Industry Data Security Standard...

Ed Moyle
5 Winning PCI 3.0 Ways
12/21/13 5:00 AM PT | E-Commerce Times | 1087 Words

As most security and compliance pros already know, PCI 3.0 is now officially out. The specific changes it includes have already...

Ed Moyle
Securing the Internet of Things: 5 Easy Pieces
11/15/13 5:00 AM PT | E-Commerce Times | 988 Words

The Internet of Things has been receiving quite a bit of attention. Definitions vary, but at its core the concept is...

Ed Moyle
Revisiting Risk Assessment in the Cloud
10/01/13 5:00 AM PT | E-Commerce Times | 979 Words

As the prolific trend of adoption would suggest, the case for cloud is compelling from both a business and technology perspective....

Ed Moyle
4 Quick and Dirty SaaS Technical Controls
09/03/13 5:00 AM PT | E-Commerce Times | 1136 Words

It seems cloud has gone from "emerging" to "entrenched" faster than any technology in recent memory -- and much of cloud...

Ed Moyle
Staying Secure in the Cloud-Adoption Aftermath
08/05/13 5:00 AM PT | E-Commerce Times | 1174 Words

By now, most organizations have adopted cloud. Increased and widespread adoption as well as expansion of existing deployments are reflected in...

Ed Moyle
Avoiding Unpleasant Cloud Surprises
07/16/13 5:05 AM PT | E-Commerce Times | 1056 Words

For most technologists in the enterprise nowadays, cloud is a pretty big deal -- and securing it can be an even...

Ed Moyle
Criticism: A Security Chief's Most Valuable Resource
05/17/13 5:00 AM PT | TechNewsWorld | 975 Words

This past week, a lesson about enterprise information security found its way to me via a somewhat unorthodox channel: specifically, an...

Ed Moyle
Android: A Second Career in Security?
04/23/13 5:00 AM PT | TechNewsWorld | 999 Words

Did you know Julia Child was 37 before she learned to cook? It was a full decade later that she first...

Ed Moyle
Keeping Up With the Future: Risk Management for Rapid Technology Adoption
02/22/13 5:00 AM PT | TechNewsWorld | 1009 Words

Everyone knows that protecting an organization's technology footprint has always been a delicate balancing act. Nowadays, literally everything about a given...

1 2 3 4 5 6 Next

Search for: In:

Facebook Twitter LinkedIn Google+ RSS
What is the most consequential impact of social media on society today?
It has opened up valuable new channels for civil discourse.
It has destroyed the meaning of "truth" and "fact."
It has made people stronger by facilitating grass roots activism.
It has deepened divisions among groups with opposing views.
It has made it easier for people to support and help each other.
It has made it easier for people to humiliate and hurt each other.