Evan Schuman

Contributing Columnist

star Thought Leader IDG Contributor Network
Want to Join?
Opinions expressed by ICN authors are their own.

Evan Schuman has covered IT issues for a lot longer than he'll ever admit. The founding editor of retail technology site StorefrontBacktalk, he's been a columnist for CBSNews.com, RetailWeek, Computerworld and eWeek and his byline has appeared in titles ranging from BusinessWeek, VentureBeat and Fortune to The New York Times, USA Today, Reuters, The Philadelphia Inquirer, The Baltimore Sun, The Detroit News and The Atlanta Journal-Constitution. Evan can be reached at eschuman@thecontentfirm.com and he can be followed at twitter.com/eschuman. Look for his blog twice a week.

The opinions expressed in this blog are those of Evan Schuman and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Telecommuting in a post-COVID U.S. will be radically different. And that's a very good thing.

Is Machine Learning Part of Your Security Strategy?

Is Machine Learning Part of Your Security Strategy?

In the world of security perimeter defenses, more is not necessarily better. This is particularly true with threat detection, where software discovering 90 million possible threats a week is really no more helpful than one that...

Can Shadow IT Be Good for Enterprises?

Can Shadow IT Be Good for Enterprises?

One of today's most enduring IT challenges is shadow IT, where business units go renegade and secure their own applications and services without involving IT, typically by leveraging cloud providers. Gartner estimates that...

Making Identity and Access Management Work for You

Making Identity and Access Management Work for You

There are many reasons why some enterprises struggle with their Identity and Access Management (IAM) strategies, but it's often not the types of authentication being explored. Too many companies still think of IAM as solely an IT...

The IoT Threat Can Be Tamed with Internal Communication

The IoT Threat Can Be Tamed with Internal Communication

The smart house today is chockful of Internet of Things (IoT) devices, from refrigerators and microwaves to thermostats and televisions. But what about the smart company? Enterprises have far more IoT devices than any residence,...

With security awareness, money talks

With security awareness, money talks

One problem with what we tell employees about taking security precautions is that the precautions interfere with their jobs.

How one personal cyber insurance policy stacks up

How one personal cyber insurance policy stacks up

As policies designed for consumers emerge, the example from AIG is surprisingly comprehensive.

Bank gets lesson in the security failings of third parties

Bank gets lesson in the security failings of third parties

Brazilian bank was an easy target after its DNS provider was compromised.

Insecure security cameras sound like a joke, but aren’t

Insecure security cameras sound like a joke, but aren’t

They’re an example of big tech companies’ failure to take security seriously.

Insecure security cameras sound like a joke, but aren’t

Insecure security cameras sound like a joke, but aren’t

They’re an example of big tech companies’ failure to take security seriously.

A better security strategy than ‘know your enemy’: Know your co-workers

A better security strategy than ‘know your enemy’: Know your co-workers

Something as simple as an uncharacteristic turn of phrase can clue people into an email’s illegitimacy.

True privacy online is not viable

True privacy online is not viable

You can hide from casual observers, but a motivated person will see through your attempts at anonymization.

Load More