Mobile security: Risks of 2014 and beyond
Mobile security: Risks of 2014 and beyond These days the vast majority of us own mobile phones with some of us owning more than one, not to mention all of the PCs, laptops, tablets and watches that keep us connected to the wide world on a daily basis; we live our lives online, we chat online, meet new […]
Out of control with BYOD in your hospital?
The number of bring your own device (BYOD) workplaces is increasing. Hospitals are certainly no exception with nursing staff, doctors and contractors bringing their own mobile devices into the hospital – and in many cases, jacking into WiFi networks in the hospital premises. With mobile access points via your smart phone – you don’t even […]
How to Save Your Data and Reputation if You Lose Your BlackBerry
5 years ago, an analysis we did of 150 data breach events showed that over 40% of the data breach events were due to stolen or lost hardware devices (Download the free research article on data breach here Business Threat Modeling Study). Stolen or lost devices were in a close second place to data being stolen […]
Anatonme – a hand held device for improving patient-doctor communications
From a recent article in Healthcare Global. Studies suggest that 30-50 percent of patients are likely to give up treatments early. Microsoft Research has developed an innovative, hand-held medical device called Anatonme to help patients understand their issue and complete their treatment plan more often. We’ve been doing research and development into private, controlled social […]
Apps vs. the Web, enemy or friend?
Saw this item on Gigaom. George Colony, the chairman and CEO of Forrester Research, re-ignited a minor firestorm recently, with a presentation at the LeWeb conference in which he argued that the web is dead, and being replaced by the app economy — with mobile and smartphone apps that leverage the cloud or other services rather than […]
The top 10 mistakes made by Linux developers
My colleague, Dr. Joel Isaacson talks about the top 10 mistakes made by Linux developers. It’s a great article and great read from one of the top embedded Linux programmers in the world. The Little Engine That Could Copyright 2004 Joel Isaacson. This work is licensed under the Creative Commons Attribution License. I try to […]
Is network PVR the best direction for the big studios ?
The distribution of video over multicast-broadcast networks and content storage at by users with Windows PCs and PVRs has created a huge threat surface for digital content. Typical to flawed security countermeasures, HDCP and AACS exacerbate and enlarge the threat surface rather than enhance revenues and reduce risk. In this article we will show that […]
Where your living room meets your PC
I recently got a new notebook (a Lenovo Thinkpad X-Series) and it’s great (my old Acer Travelmate dual core is still chugging along and refuses to die although the screen is beginning to fade – so the time had come to update personal technology). The first thing I noticed was that it comes with an […]
DLP in on-line trading
A customer case study – DLP helped diamonds.com be more secure and more competitive. We designed and implemented a large scale IT infrastructure modernization project that was tasked with improving availability, scalability and security of the online diamond trading networks at diamonds.com and diamonds.net. Network DLP appliances were deployed in the US and in EMEA […]
Digital content protection
A customer case study – Digital content protection for VOD on a TCP unicast network One of our most interesting projects recently was a digital content protection and secure content distribution software development projects in the field of IPTV and video on demand. We were called in at a critical stage in project delivery to […]