In the meantime I guess that most of us agreed that Consumerization of IT or Bring Your Own Device or how ever you want to call this will become a reality – probably rather sooner than later.
In the meantime our team in France published a few papers/guides, which are definitely worth looking at:
I . . . → Read More: Consumerization of IT
Before joining Microsoft a little bit more than 10 years ago, I ran a team at PricewarehoureCoopers on e-Business Risk Management – classical security consulting in the Internet bubble time. When I announced that I will leave PwC and join Microsoft, I got interesting reactions (and remember, this was 2001). Mainly they were along . . . → Read More: 10 Years of Trustworthy Computing at Microsoft
That’s really interesting:
Impressive! Kudos to MIT
If you like Scott Chaney’s suggestion he made at ISSE this week called Collective Defense – Applying Public Health Models to the Internet he raised very good points about the different roles the participants in the Internet Health Ecosystem have to play. Into that, the following article fits in fairly nicely: Comcast to notify subscribers with infected PCs . . . → Read More: Responsibility of ISPs for the ecosystem?
No, this is not yet another announcement – this is a picture of today’s reality. UNHCR just published a website called Protecting and Empowering Refugees, where the results of the partnership between the UNHCR and Microsoft is shown in a pretty impressive way. . . . → Read More: UNHCR and Microsoft to help refugees
Probably not. However, it indefinitely is a security risk. We are talking about this since a looooooong time as such copiers are sold since 2002. I just recently heard that the criminals are looking into this heavily and now it is even discussed publically on BCS News: Copy Machines, a Security Risk?
Actually a really . . . → Read More: Is a Copy Machine Your Biggest Security Risk?
Years ago I was sitting in a healthcare event, when a researcher was talking (very excited) about the idea of having a pacemaker with Bluetooth access to fine-tune the system and read information from the sensors. Even though this might medically be a great idea, I would be fairly reluctant having such a thing in . . . → Read More: Hacking the Human Body