Steven J. Vaughan-Nichols

Steven J. Vaughan-Nichols has been writing about technology and the business of technology since CP/M-80 was the cutting-edge PC operating system, 300bps was a fast Internet connection, WordStar was the state-of-the-art word processor, and we liked it!

You're going to be using confidential computing sooner rather than later

The five best Kubernetes security practices

The five best Kubernetes security practices

Everyone is moving to containers for their programs, and to manage them, almost everyone is using Kubernetes. That leads to one big problem: How do you secure Kubernetes itself?

Zero Trust: Protecting your company inside and out

Zero Trust: Protecting your company inside and out

The traditional castle-and-moat security model where users, once inside the firewall, were automatically trusted has long been outdated. What if you can't trust anyone in or outside your network?

Rowhammer memory attacks close in on the real world

Rowhammer memory attacks close in on the real world

This theoretical security problem is becoming all too real. Expect to see a major Rowhammer security exploit within the next year as attackers tap GPUs, FPGAs and more to accelerate the process. Here's how to protect yourself.

How close are we to breaking encryption with quantum computing?

How close are we to breaking encryption with quantum computing?

Not as close as you might fear, but quantum encryption cracking is on its way. So, it's time to start getting ready for it.

The trouble with 2fa

The trouble with 2fa

With a large percentage of your workforce now working remotely, two-factor authentication (2fa) can make them (or your company data) safer online. But how you're doing it now probably isn't helping much at all.

How to protect yourself from coronavirus phishing threats

How to protect yourself from coronavirus phishing threats

The worst disease of the century brings out the worst in people as phishing attacks increase to unprecedented levels. Here's how to spot and COVID-19 phishing attacks and five ways to avoid them.

Don’t let the coronavirus make you a home office security risk

Don’t let the coronavirus make you a home office security risk

Congratulations. You're now the chief security officer of your company’s newest branch office: Your home. Here's how to manage your new job.

Securing the IoT is a nightmare

Securing the IoT is a nightmare

Currently, we have over 26-billion IoT devices running in our workplaces, offices and homes. If you're looking for an IoT security scorecard, it looks something like this: Security Threats: 26,000,000,000, IoT Secure Devices: 0.

Cloud security: Inside the shared responsibility model

Cloud security: Inside the shared responsibility model

The Capital One security fiasco has underlined that securing the cloud is both a complicated technology and contractual problem.

Internet privacy? Who needs that?

Internet privacy? Who needs that?

Senate Republicans think it’s fine and dandy for your ISP to sell your private data.

What’s up with Windows patching, Microsoft?

What’s up with Windows patching, Microsoft?

A month late? Seriously? It’s both outrageous and unsurprising.

Load More