Mary Branscombe

Mary Branscombe

Mary Branscombe is a freelance journalist who has been covering technology for over two decades and has written about everything from programming languages, early versions of Windows and Office and the arrival of the web to consumer gadgets and home entertainment. She’s been using mobile email since 1993 and taking handwritten notes on a tablet PC since 2003 and vastly prefers the earlier versions of VBA to JavaScript (Prolog is also a particular favorite). The shortest description might be: warning, contains opinions. 

How to track and secure open source in your enterprise

Why you need a bug bounty program

Why you need a bug bounty program

If you’re ready to deal with the volume of reports, a bug bounty program can help you can find the holes in your system — before attackers do.

What's next for Azure Site Recovery?

What's next for Azure Site Recovery?

Microsoft’s Azure-based high availability disaster recovery service turns the cloud into your off-site failover for complex applications, and it can double as a migration strategy.

 How to handle security vulnerability reports

How to handle security vulnerability reports

There are people out there willing to help with your company’s security issues. Isn’t it time your company had its own ‘see something, say something’ policy?

How Windows Server 2016 is tackling security

How Windows Server 2016 is tackling security

Windows Server 2016 could be a generational shift in security on par with Bill Gates’ introduction of Trustworthy Computing in 2002.

Why you need DRM for your documents

Why you need DRM for your documents

From protecting merger discussions to everyday document management, enterprise DRM is a mature, mainstream enterprise technology. So why aren’t more companies using it?

Are you failing Security Basics 101?

Are you failing Security Basics 101?

Patching, backups, firewall configuration … when it comes to security, make sure you take care of your infrastructure before you invest in next-level tools.

Is DevOps good or bad for security?

Is DevOps good or bad for security?

Does DevOps give you better security through agility or make development and deployment too fast to secure?

How much security can you turn over to AI?

How much security can you turn over to AI?

Machine learning and behavioral analytics could help you detect attacks faster – or stop them before they even start.

Is it time for Identity as a Service?

Is it time for Identity as a Service?

The concept of security these days goes well beyond insisting on complicated passwords. Are you sure your company is up to the task?

Is BYOK the key to secure cloud computing?

Is BYOK the key to secure cloud computing?

Amazon, Adobe and Microsoft offer it but how realistic is it to “bring your own keys?” Do you want your business to have the burden of managing and securing your own cloud encryption keys?

How secure is the hybrid cloud?

How secure is the hybrid cloud?

The term hybrid cloud is used loosely, which is probably why so many companies say they're planning to adopt it. If you’re planning a hybrid cloud strategy, the security questions you need to think about may not be the ones you’d...

Load More