Jack Gold

Want to Join?
Opinions expressed by ICN authors are their own.

Jack E. Gold is founder and principal analyst at J. Gold Associates, LLC., an analyst firm in Northborough, Mass. With more than 45 years of experience in the computer and electronics industries, and 25 years as a tech industry analyst, he covers the many aspects of business and consumer computing and emerging technologies.

Follow Jack on Twitter at @jckgld and on LinkedIn.

The opinions expressed in this blog are those of Jack Gold and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Confidential Computing: What is it and why do you need it?

Is everything you thought you'd done right for security about to be at risk?

Is everything you thought you'd done right for security about to be at risk?

It may still be early days for quantum computing, but there has been significant progress recently. But what does that mean for today’s 'unbreakable' encrypted data?

Mobile security failings putting enterprises at risk

Mobile security failings putting enterprises at risk

A typical mobile security breach in a large organization can cost millions of dollars. Mobile Security can be a daunting task with many potential pitfalls to protect against. Knowing the key security exposure mechanisms can help you...

Is enterprise security broken?

Is enterprise security broken?

Deploying independent endpoint or network security separately is coming to a rapid – and much-needed -- end. If you want to stay secure longer-term, focus on unifying your security products now.

Coronavirus: What companies are ready for our new reality?

Coronavirus: What companies are ready for our new reality?

One class of companies is already equipped to work in a fully distributed employee model. Another going to have a difficult time adapting to most employees having to work from home. Some won’t survive if this lasts more than a few...

Next-generation endpoint security goes beyond the endpoint

Next-generation endpoint security goes beyond the endpoint

AI and behavioral analysis are key to elevating the level of security for devices and back-end systems and are a prerequisite for IoT devices and services. Is your vendor moving in the right direction?

Why multicloud security is your next big challenge

Why multicloud security is your next big challenge

Companies deploy an average of three to five different cloud services. With an increased emphasis on security and regulatory compliance, the capability to manage these disparate systems is crucial.

Will 5G increase mobile security?

Will 5G increase mobile security?

We love our smartphones, but there's a dark side. Their prevalence and users’ tendencies to connect over public Wi-Fi make mobile devices a common target of bad guys. Analyst Jack Gold looks at how to mitigate the risk.

3 ways to improve PC security

3 ways to improve PC security

Insider Pro columnist Jack Gold writes that organizations must focus on three key areas if they want to protect their PCs -- and ultimately the entire organization -- from security breaches.

Can you be mobile AND secure?

Can you be mobile AND secure?

Despite the security challenges mobile devices create, there is no going back. Users demand corporate access from their smartphones and companies benefit from this access with increased efficiency, better use of time and improved user...

‘Can everyone hear me now?’

‘Can everyone hear me now?’

Voice interception of mobile calls is an invisible security hole that isn’t getting enough attention.

Load More