Avatar

All posts by Ron Miller

Ron Miller is a freelance technology reporter and blogger. He is contributing editor at EContent Magazine and enterprise reporter at TechCrunch.

For goodness’ sake, get a web filter

For goodness’ sake, get a web filter

This week, news emerged about a government agency being infected with malware because one of its employees apparently liked to watch porn on his work computer. This is a classic case of an organization not putting safeguards in place that...

/ November 1, 2018
Yahoo’s $50M damages bill demonstrates the high cost of poor security

Yahoo’s $50M damages bill demonstrates the high cost of poor security

Years ago there was a commercial for oil filters in which the spokesperson warned that you could pay him a few dollars for a filter or pay a mechanic later for an expensive repair. “Pay me now, or pay him...

/ October 30, 2018
Stop blaming your employees for your lousy security

Stop blaming your employees for your lousy security

Seems like every week we hear a story blaming employees for being lax about security. They have bad passwords or they fall for phishing scams. They do all kinds of things that compromise your company’s security position, but here’s the...

/ October 18, 2018
Google launches new authentication service for drop-in identity management

Google launches new authentication service for drop-in identity management

When it comes to identity management, you want to make it as simple as possible. Most small businesses don’t have the development resources to build a solution with solid identity capabilities built-in from scratch. If you can’t afford to build...

/ October 12, 2018
Managing identity between machines remains a challenge

Managing identity between machines remains a challenge

As we move into a time of machines conducting business on our behalf, we need to start thinking about the implications of that in terms of security and identity. If your machine is talking to my machine, we suddenly have...

/ October 5, 2018
Securing content in motion has become much easier

Securing content in motion has become much easier

For many years, content management vendors have been trying to protect content as it moved through the world by attaching a set of rules. The earliest attempt, before the cloud came along, was called Information Rights Management (IRM). It was a...

/ September 27, 2018
Single sign-on can simplify life for your employees

Single sign-on can simplify life for your employees

As you company collects cloud services, it can be a pain tracking logins. A good way to get around that problem is providing your users with a single sign-on. This is a delightful concept that gives your users a single...

/ September 21, 2018
Two-factor authentication can solve the worst password problems

Two-factor authentication can solve the worst password problems

Small to medium-sized businesses often struggle with identity management because they lack the resources of big companies to implement enterprise solutions, but something as simple as two-factor authentication can help keep your company secure. Two-factor authentication simply means that after...

/ September 14, 2018
Today’s hackers are definitely not your father’s hackers

Today’s hackers are definitely not your father’s hackers

There was once a hacker stereotype — the prototype was a pimply-faced teenage boy living in his parent’s basement in some nondescript suburb. His end goal was proving he could get into your network and show off his bonafides to...

/ September 4, 2018 / 2 Comments
Foreshadow vulnerability
When the vulnerabilities hit your CPU, you can only wait for patches

When the vulnerabilities hit your CPU, you can only wait for patches

Just when you thought it was safe to open up your computer, word emerged this month of another Intel chip vulnerability called L1TF / Foreshadow or more commonly just Foreshadow. According to TechRepublic, it’s eerily similar to the Spectre/Meltdown issues discovered...

/ August 27, 2018