John McNulty

Two-Factor Authentication Still Strong

Bruce Schneier, a highly respected security expert, recently wrote an essay titled "The Failure of Two-Factor Authentication." Schneiers article has stimulated a lively debate in the banking IT security...

Latest Posts

IBM Sets Another Smallness Record with 2nm Chip Blueprints

Okay, now that IBM has revealed its 2nm chip design and process blueprint, what's next? A virtual chip? Two nanometers is smaller in width...

Dell Unveils, Explains APEX ‘Portfolio-as-a-Service’

In one of its busiest news-making days in the last few years, Dell EMC on May 5 at its  virtualized Dell Technologies World unveiled...

Dell-VMware Split a Hot Topic for IT Watchers

An old Bob Dylan song titled “The Times They are A-Changin' ” reminds me of what’s going on in tech today. The reality is...

Why It’s Critical to Manage Privileges and Access Across Your Multi-Cloud Environments

Conventional approaches to privileged access and identity management are ineffective in today’s cloud-oriented DevSecOps environments. The concept of least privilege access still remains foundational...

Five Hidden Costs in Code Migration: How to Avoid Surprise Expenses

Migration to the cloud is in full flight. The most complex challenge involved in completing these migrations is not moving the data but migrating...