The Real Risks of Virtual Reality

This summer, Facebook finalized its $2 billion purchase of Oculus VR, a virtual reality headset maker. The purchase promises to usher in a new era for virtual reality-more immersive, lower cost and simply more...

Open source pitfalls – and how to avoid them

Open source pitfalls – and how to avoid them

It’s hard to imagine a company these days that isn’t using open source software somewhere, whether it’s Linux running a company’s print and web servers, the Firefox browser on user desktops, or the Android...

Policy Debate

Cyberinsurance still a puzzle for many corporates Data breach costs are rising, as hackers go after ever-bigger targets and regulators get tougher about fines and disclosure. Fortunately, companies now have plenty of choices when...

Cyberinsurance: Products Mature but Still Underused

Cyberinsurance: Products Mature but Still Underused

Risk transfer opportunities have proliferated, as have the threats The bad news keeps coming. Every month, some company somewhere is hacked and loses confidential data. A storm of negative publicity — and lawsuits —...

Virtual Worlds, Real Risks

Online communities and collaborative workspaces create operational and security vulnerabilities – but also opportunities to deploy enterprise-grade, risk-based solutions. Carroll University’s library commons was a victim of its own success. The commons — which takes...

Cyber Security Review

As threats proliferate, here are five areas where companies need to strengthen and update their policies and practices. It’s particularly galling when a company specializing in security issues gets monumentally hacked. That was the...

Fail-Safe for Clouds

Companies with backup systems in place kept their businesses running when a major outage at Amazon shut down websites.

Putting IPads to Work

Spurred by enthusiastic senior executives and rank-and-file employees, companies are starting to roll out iPads in the enterprise, especially for board meetings and sales staff.

Cloud Containment

As cloud vendors mature, Web-based delivery of applications, storage and infrastructure is getting more secure and trustworthy.

Driving Monitor

If an iPhone can make people healthier by tracking how many steps they take, why can’t something similar make cars and trucks safer by monitoring drivers’ behavior? Telematics equipment–black boxes–has been available for years,...