Encryption can’t protect your data while you’re logged in

Tony Bradley , PCWorld Follow me on Google+

Tony is principal analyst with the Bradley Strategy Group, providing analysis and insight on tech trends. He is a prolific writer on a range of technology topics, has authored a number of books, and is a frequent speaker at industry events.
More by

You carry a lot of data and sensitive information on your laptop, tablet, and smartphone. The standard method of protecting that information from prying eyes is to encrypt it, rendering the data inaccessible. But with most encryption software, that information becomes accessible the moment you log in to the device as a matter of convenience.

Think about what information that might be: names, postal and email addresses, and phone numbers for friends, family, clients, and business associates; calendar events indicating where you’ll be and when you’ll be there; personal photographs; and more. You might also have proprietary information about your company, clients, information that companies have entrusted you under the terms of non-disclosure agreements, and other sensitive information that should be secured.

Encrypting data protects it from unauthorized access.
Read more »

0

Massive Java update won’t get Oracle out of attacker’s crosshairs

Tony Bradley , PCWorld Follow me on Google+

Tony is principal analyst with the Bradley Strategy Group, providing analysis and insight on tech trends. He is a prolific writer on a range of technology topics, has authored a number of books, and is a frequent speaker at industry events.
More by

Java continues to be Public Enemy No. 1 when it comes to computer and network security. Oracle released a huge update for the virtually ubiquitous software, but attackers aren’t done exploiting Java as the weakest link in the security chain, and Oracle isn’t securing it fast enough.

The update released by Oracle yesterday addresses 40 vulnerabilities in Java. It also enables online certificate revocation in Java by default, to allow Java to verify in real time whether certificates used to sign Java code have been revoked to prevent execution of malware.

java
Java is an attacker's dream; it's virtually ubiquitous and full of holes.
Read more »

3

Social mapping does much more than just get you where you’re going

Tony Bradley , PCWorld Follow me on Google+

Tony is principal analyst with the Bradley Strategy Group, providing analysis and insight on tech trends. He is a prolific writer on a range of technology topics, has authored a number of books, and is a frequent speaker at industry events.
More by

Google acquiring Waze almost seems redundant. Google is already a recognized leader in mapping services, so why does it need to buy a mapping company? The answer is that maps aren’t just maps anymore, and Waze will help Google move from mapping to social mapping.

It might look at first glance like the Waze purchase is a predatory move. Google has deep pockets and it can afford to spend money to buy Waze simply to prevent rivals from doing so. It may not actually use or incorporate Waze, because the goal of buying Waze is purely a strategic move to keep competitors in the rearview mirror.

waze
Waze adds real-time data from its social network to help you navigate.
Read more »

0

There's really no such thing as a 'best' mobile provider

Tony Bradley , PCWorld Follow me on Google+

Tony is principal analyst with the Bradley Strategy Group, providing analysis and insight on tech trends. He is a prolific writer on a range of technology topics, has authored a number of books, and is a frequent speaker at industry events.
More by

As with all things tech, there are rabidly loyal fans of each of the four major mobile network providers, and strong opinions on all sides about which is the “best.” While Verizon, AT&T, Sprint, and T-Mobile each have their pros and cons, it’s virtually impossible to declare one the winner.

Late last month, PCWorld's sister site TechHive published results of its own nationwide study. After bouncing around the country testing the speed and reliability of the mobile networks from city to city, TechHive declared that AT&T takes the crown this year as the fastest mobile network provider. Kudos to AT&T, but the victory has little impact in the real world.

The "best" mobile service varies
from place to place.
Read more »

0

Security experts weigh in on Patch Tuesday priorities

Tony Bradley , PCWorld Follow me on Google+

Tony is principal analyst with the Bradley Strategy Group, providing analysis and insight on tech trends. He is a prolific writer on a range of technology topics, has authored a number of books, and is a frequent speaker at industry events.
More by

It’s Patch Tuesday—the sixth one of 2013. As far as Patch Tuesdays go, June is relatively light—with a mere five security bulletins, and only one rated as Critical—but that’s no reason to let your guard down.

The average number of security bulletins for the first five months of 2013 was nine. A paltry five security bulletins for June is only about half what IT admins have come to expect, so it’s nice to get to take it easy a bit. The one Critical security bulletin is the cumulative update for Internet Explorer, along with four Important security bulletins that still deserve prompt attention.

The only Critical security bulletin this month is the update for IE.
Read more »

2

HP launches new CRM and MDM tools

Tony Bradley , PCWorld Follow me on Google+

Tony is principal analyst with the Bradley Strategy Group, providing analysis and insight on tech trends. He is a prolific writer on a range of technology topics, has authored a number of books, and is a frequent speaker at industry events.
More by

Mobile devices and the cloud have transformed the way business is conducted. HP introduced new tools today for business customers to leverage that transformation and work seamlessly with Salesforce and Good for Enterprise.

HP has a strong foothold with business customers buying both PCs and servers. As the market for traditional PCs has declined, HP has worked to expand its sphere of influence in software and services.

Salesforce, meanwhile, is one of the leading customer relationship management (CRM) platform vendors. The company's name has become synonymous with cloud-based business tools, and HP believes that many of its customers rely on Salesforce to get things done.

Read more »

2

The art and science of risk management

Tony Bradley , PCWorld Follow me on Google+

Tony is principal analyst with the Bradley Strategy Group, providing analysis and insight on tech trends. He is a prolific writer on a range of technology topics, has authored a number of books, and is a frequent speaker at industry events.
More by

Computers, networks, and information security seem to fall comfortably under the heading of science, but science alone is not enough. Security system developer Tripwire recently conducted a survey in cooperation with the Ponemon Institute to find out whether IT professionals consider risk management to be “science” or “art."

Ponemon surveyed 1,320 respondents across the United States and the United Kingdom: IT professionals working in information security, risk management, IT operations, business operations, and compliance. Participants were asked, “In your opinion, is information security risk management an ‘art’ or ‘science’?”

Tripwire commissioned the Ponemon Institute to
conduct a risk management survey.
Read more »

2