Evan Schuman

Contributing Columnist

Want to Join?
Opinions expressed by ICN authors are their own.

Evan Schuman has covered IT issues for a lot longer than he'll ever admit. The founding editor of retail technology site StorefrontBacktalk, he's been a columnist for CBSNews.com, RetailWeek, Computerworld and eWeek and his byline has appeared in titles ranging from BusinessWeek, VentureBeat and Fortune to The New York Times, USA Today, Reuters, The Philadelphia Inquirer, The Baltimore Sun, The Detroit News and The Atlanta Journal-Constitution. Evan can be reached at eschuman@thecontentfirm.com and he can be followed at twitter.com/eschuman. Look for his blog twice a week.

The opinions expressed in this blog are those of Evan Schuman and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Is Machine Learning Part of Your Security Strategy?

Can Shadow IT Be Good for Enterprises?

Can Shadow IT Be Good for Enterprises?

One of today's most enduring IT challenges is shadow IT, where business units go renegade and secure their own applications and services without involving IT, typically by leveraging cloud providers. Gartner estimates that...

Making Identity and Access Management Work for You

Making Identity and Access Management Work for You

There are many reasons why some enterprises struggle with their Identity and Access Management (IAM) strategies, but it's often not the types of authentication being explored. Too many companies still think of IAM as solely an IT...

The IoT Threat Can Be Tamed with Internal Communication

The IoT Threat Can Be Tamed with Internal Communication

The smart house today is chockful of Internet of Things (IoT) devices, from refrigerators and microwaves to thermostats and televisions. But what about the smart company? Enterprises have far more IoT devices than any residence,...

With security awareness, money talks

With security awareness, money talks

One problem with what we tell employees about taking security precautions is that the precautions interfere with their jobs.

How one personal cyber insurance policy stacks up

How one personal cyber insurance policy stacks up

As policies designed for consumers emerge, the example from AIG is surprisingly comprehensive.

Bank gets lesson in the security failings of third parties

Bank gets lesson in the security failings of third parties

Brazilian bank was an easy target after its DNS provider was compromised.

Insecure security cameras sound like a joke, but aren’t

Insecure security cameras sound like a joke, but aren’t

They’re an example of big tech companies’ failure to take security seriously.

Insecure security cameras sound like a joke, but aren’t

Insecure security cameras sound like a joke, but aren’t

They’re an example of big tech companies’ failure to take security seriously.

A better security strategy than ‘know your enemy’: Know your co-workers

A better security strategy than ‘know your enemy’: Know your co-workers

Something as simple as an uncharacteristic turn of phrase can clue people into an email’s illegitimacy.

True privacy online is not viable

True privacy online is not viable

You can hide from casual observers, but a motivated person will see through your attempts at anonymization.

Bots may send your liability risk soaring

Bots may send your liability risk soaring

Judges and juries may think that a company should be better able to eliminate errors in responses with automation.

Load More