

Evan Schuman
Contributing Columnist
Evan Schuman has covered IT issues for a lot longer than he'll ever admit. The founding editor of retail technology site StorefrontBacktalk, he's been a columnist for CBSNews.com, RetailWeek, Computerworld and eWeek and his byline has appeared in titles ranging from BusinessWeek, VentureBeat and Fortune to The New York Times, USA Today, Reuters, The Philadelphia Inquirer, The Baltimore Sun, The Detroit News and The Atlanta Journal-Constitution. Evan can be reached at eschuman@thecontentfirm.com and he can be followed at twitter.com/eschuman. Look for his blog twice a week.
The opinions expressed in this blog are those of Evan Schuman and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

6 new ways threat actors will attack in 2021
Cyber criminals will leverage improved capabilities and vulnerabilities introduced during the COVID crisis to improve the efficiency of their attacks.

Telecommuting in a post-COVID U.S. will be radically different. And that's a very good thing.
IT execs need to start talking with other C-levels now and figure out what they want their post-COVID company to look like.

Is Machine Learning Part of Your Security Strategy?
In the world of security perimeter defenses, more is not necessarily better. This is particularly true with threat detection, where software discovering 90 million possible threats a week is really no more helpful than one that...

Can Shadow IT Be Good for Enterprises?
One of today's most enduring IT challenges is shadow IT, where business units go renegade and secure their own applications and services without involving IT, typically by leveraging cloud providers. Gartner estimates that...

Making Identity and Access Management Work for You
There are many reasons why some enterprises struggle with their Identity and Access Management (IAM) strategies, but it's often not the types of authentication being explored. Too many companies still think of IAM as solely an IT...

The IoT Threat Can Be Tamed with Internal Communication
The smart house today is chockful of Internet of Things (IoT) devices, from refrigerators and microwaves to thermostats and televisions. But what about the smart company? Enterprises have far more IoT devices than any residence,...

With security awareness, money talks
One problem with what we tell employees about taking security precautions is that the precautions interfere with their jobs.

How one personal cyber insurance policy stacks up
As policies designed for consumers emerge, the example from AIG is surprisingly comprehensive.

Bank gets lesson in the security failings of third parties
Brazilian bank was an easy target after its DNS provider was compromised.

Insecure security cameras sound like a joke, but aren’t
They’re an example of big tech companies’ failure to take security seriously.

A better security strategy than ‘know your enemy’: Know your co-workers
Something as simple as an uncharacteristic turn of phrase can clue people into an email’s illegitimacy.