Steven J. Vaughan-Nichols

Steven J. Vaughan-Nichols has been writing about technology and the business of technology since CP/M-80 was the cutting-edge PC operating system, 300bps was a fast Internet connection, WordStar was the state-of-the-art word processor, and we liked it!


8 top SBOM tools to consider

8 top SBOM tools to consider

These commercial and open-source tools will scan code and create software bills of materials automatically.

Can WebAuthn and U2F finally give us safe and easy Two-Factor authentication?

Can WebAuthn and U2F finally give us safe and easy Two-Factor authentication?

Using a smartphone for two-factor authentication is easy, but it's not as secure as you might think. The real future for secure 2FA lies in the WebAuthn and Universal 2nd Factor standards.

SolarWinds: "IT's Pearl Harbor"

The experts agree. SolarWinds was the worst security disaster of all time, and it's not done with us yet.

AWS chief Andy Jassy gets top job at Amazon as CEO Bezos steps down

AWS chief Andy Jassy gets top job at Amazon as CEO Bezos steps down

The surprise announcement that Jeff Bezos will leave later this year and hand over the reins to AWS leader Andy Jassy marks a remarkable rise for Jassy. He began as a marketing manager in 1997 and started AWS in 2003.

Beyond the firewall: Intrusion Detection Systems

Beyond the firewall: Intrusion Detection Systems

Firewalls are so 2000s. With your "office" now scattered over homes everywhere, you need a new way of protecting your office from network threats and that's IDSs.

Five ways to keep working from home safe for your employees and your company

Five ways to keep working from home safe for your employees and your company

For many of us, we're not going back to working from the office anytime soon, so it's time to give serious thought about securing our home offices.

You're going to be using confidential computing sooner rather than later

These days it's not enough to secure your data when it's on your disk or moving across your network, you need to lock it down in memory as well.

5 Kubernetes security best practices

Everyone is moving to containers for their programs, and to manage them, almost everyone is using Kubernetes. That leads to one big problem: How do you secure Kubernetes itself?

How zero trust protects your company: inside and out

The traditional castle-and-moat security model where users, once inside the firewall, were automatically trusted has long been outdated. What if you can't trust anyone in or outside your network?

Rowhammer memory attacks close in on the real world

This theoretical security problem is becoming all too real. Expect to see a major Rowhammer security exploit within the next year as attackers tap GPUs, FPGAs and more to accelerate the process. Here's how to protect yourself.

How close are we to breaking encryption with quantum computing?

Not as close as you might fear, but quantum encryption cracking is on its way. So, it's time to start getting ready for it.

Load More