Ben Rothke

Secure Your Shredding

For years, companies have been routinely shredding physical documents to ensure that confidential and sensitive information doesnt fall into the hands of competitors. This practice is partly due to...

Anti-Spyware Efforts Trump the Law

Congress is considering anti-spyware legislation, and while the intent of our legislators is laudable, it is doubtful that Congress can pass an effective, enforceable anti-spyware bill. First, spyware is difficult...

Music Industry Security Sings the Blues

Why cant the music industry get security right? Why cant the industry that whimpers about billions of dollars in losses via peer-to-peer services find an effective security mechanism to...

Superficial Security

In a new book, "Business Under Fire: How Israeli Companies are Succeeding in the Face of Terror—and What We Can Learn from Them," author Dan Carrison interviewed consultant Danny...

How Do We Know if E-Voting Is a Success or Failure?

In the days after the Nov. 2 presidential election, we were treated to headlines such as "E-voting passed the test" on Techweb.com and "Success claimed for US e-voting machines"...

Latest Posts

How Tech Companies Can Boost Cyber Defenses: Building a Cyber-First Culture

Today’s accelerated pace of digital transformation brings significant opportunities for businesses to grow and drive value for shareholders. At the same time, the rise...

Zoomtopia: AI and Video to Power Healthcare

At the recent Zoomtopia event, the company touted its ability to power digital healthcare. Zoom already integrates with popular electronic health record (EHR) systems, such...

eWEEK eSPEAKS Video Podcast with James Maguire

Episode 32: Semperis’s Mickey Bresman: How to Secure Your Active Directory Mickey Bresman, Co-founder and CEO of Semperis, provides three tips for securing your Active...

DevOps or ‘DevOops’: Three Tips for Successful DevOps

Throughout my career as an IT consultant, working with various platforms and technologies, I’ve encountered a myriad of terms pitched to me to explain...

Using Personal Data for Analytics Requires Balancing Accessibility and Security

Digital transformation of financial services is driving an increasingly automated analytics process in which personally identifiable information (PII) about borrowers is transmitted and stored...