Search Results

Results 1-4 of 4 for Patrick Sweeney

Securing SCADA Systems: Where Do We Start?

Many leading industrial and governmental network infrastructures employ supervisory control and data acquisition (SCADA) and distributed control systems (DCS) to automate, monitor and control crucial physical processes, including manufacturing and testing, electrical transmission, water and fuel transport, and traffic signal operation. ...


The Top 3 Tech Trends Shaping 2011

Three overarching, interrelated trends -- cloud consumption, virtualization and mobility -- present themselves as key industry themes for 2011. All have been increasing in importance over several years, and this year, all will reach a tipping point for businesses and information security providers alike. ...


10 Best IT Practices for Smartphone Security

The use of smartphones as business tools has reached a tipping point. Soon, mobile phones will overtake PCs as the most common Web access devices worldwide. As a result, employees will look less to corporate IT as a source for technical leadership. As mobile phones provide cutting-edge smartphone technology, employees will look to consumer-oriented vendors that cater to their own personal needs, rather than those of their employers.


The Promise and the Peril of Web 2.0

Web 2.0 enables companies to build dynamic networking communities and foster ad hoc collaboration among employees, customers and partners. This can be great for businesses, as they can gain insights and feedback in hours instead of weeks or months. However, the trusting, collaborative and open nature of the Web 2.0 environment is precisely what makes it ripe for malicious exploitation. ...

Technewsworld Channels