Tony Bradley

Tony is principal analyst with the Bradley Strategy Group, providing analysis and insight on tech trends. He is a prolific writer on a range of technology topics, has authored a number of books, and is a frequent speaker at industry events.

Security experts weigh in on Microsoft’s Patch Tuesday for September

Security experts weigh in on Microsoft’s Patch Tuesday for September

Microsoft released 12 security bulletins for the September 2015 Patch Tuesday and security experts shed light on which should be your top priorities to implement.

The disaster recovery lessons we learned after Katrina

The disaster recovery lessons we learned after Katrina

The destruction of the hurricane itself, and the subsequent flooding that put most of New Orleans underwater knocked many businesses out of commission—and more than a few completely out of existence. Thankfully, we have learned a lot...

Maybe it’s time to eliminate “something you know” as an authentication method

Maybe it’s time to eliminate “something you know” as an authentication method

Something you know is the least secure method of authentication and the easiest to crack or compromise. It's time to stop relying on something you know for secure authentication.

Is Windows 10 the end of privacy as we know it?

Is Windows 10 the end of privacy as we know it?

Some are freaking out over Windows 10 privacy settings but Microsoft is not "Big Brother" and the features and services that make Windows 10 great require some tradeoffs of privacy for functionality.

Why Oracle CSO attempt to shoot the messenger is misguided

Why Oracle CSO attempt to shoot the messenger is misguided

Oracle CSO Mary Ann Davidson stepped on a landmine when she wrote a post waging war against security researchers and threatening legal action against customers who dare to discover security flaws in Oracle software.

When will we actually be able to say ‘hello’ to Windows Hello?

When will we actually be able to say ‘hello’ to Windows Hello?

Windows 10 comes with Windows Hello authentication to provide better security, but few users have the hardware required to log in using facial recognition, iris scanning, or fingerprint scanning.

Just get rid of Java finally

Just get rid of Java finally

The latest security update from Oracle fixed 25 vulnerabilities in Java, including a zero-day flaw being actively exploited in the wild. It's time to just get rid of Java on the client unless it's absolutely essential.

Behind the curtain of the Hacking Team hack

Behind the curtain of the Hacking Team hack

Hacking Team has been embarrassed publicly by the hack that leaked 400GB of internal data, but beneath the surface it's not all that different from a lot of security vendors out there.

Reports suggest Trump Hotel chain credit card breach

Reports suggest Trump Hotel chain credit card breach

A pattern of fraudulent credit card activity seems to point to a breach at the Trump Hotel Collection chain.

Gap in cybersecurity knowledge creates challenges for organizations

Gap in cybersecurity knowledge creates challenges for organizations

Survey from the Ponemon Institute and Fidelis Cybersecurity shows limited cybersecurity knowledge of board members impacts trust and affects the overall security posture for organizations.

Businesses ill-prepared to defend against dramatic rise in zero day attacks

Businesses ill-prepared to defend against dramatic rise in zero day attacks

The Check Point 2015 Security Report highlights a number of key security trends--including the impact of the rise of zero day attacks against organizations.

Are commercial planes in danger of being hacked?

Are commercial planes in danger of being hacked?

The information security community weighs in on the possibility that a commercial plane can be hacked through the passenger-facing entertainment network.

Citrix Workspace Cloud lets users be productive and secure from virtually anywhere

Citrix Workspace Cloud lets users be productive and secure from virtually anywhere

At Citrix Synergy this week Citrix unveiled the new Workspace Cloud platform that enables customers to manage and deliver workspace services from a cloud-based control plane.

HackerOne research examines market dynamics of zero day vulnerabilities

HackerOne research examines market dynamics of zero day vulnerabilities

Katie Moussouris teamed up with MIT and Harvard researchers to explore the financial incentives and market dynamics that drive vulnerability disclosure.

Dabbling in two-factor authentication can be dangerous

Dabbling in two-factor authentication can be dangerous

Selectively implementing two-factor authentication doesn't provide comprehensive protection and can give organizations a false sense of security.

Cyber threat intelligence is crucial for effective defense

Cyber threat intelligence is crucial for effective defense

A new Ponemon report commissioned by Webroot underscores the importance of threat intelligence in developing a strong security posture.

Barracuda adds Android support in MDM platform

Barracuda adds Android support in MDM platform

Barracuda’s cloud-based mobile device and application management service now includes support for Android mobile devices.

Box offers customers better data protection with Enterprise Key Management

Box offers customers better data protection with Enterprise Key Management

Box rolled out EKM (Enterprise Key Management) this week to enable business customers to control and manage their own encryption keys.

Make sure your company isn’t the next Anthem

Make sure your company isn’t the next Anthem

Security experts weigh in on the massive data breach of Anthem, and offer advice to make sure your company isn’t compromised as well.

CrowdStrike demonstrates how attackers wiped the data from the machines at Sony

CrowdStrike CTO Dmitir Alperovitch talks about how attackers were able to bring Sony to its knees, and what you need to do to defend against similar attacks.

Load More