Technology expert Evan Schuman takes an authoritative look at the faults and foibles of enterprise IT.
If you can't trust the product, can you trust the vendor behind it?
Corporate privacy policies are supposed to reassure customers that their data is safe. So why are companies listing every possible way they can use that data?
It’s bad enough when an employee goes rogue and does an end-run around IT; but when a vendor does something similar, the problems could be broadly worse.
Given the plethora of privacy rules already in place in Europe, how are companies with shiny, new, not-understood genAI tools supposed to comply? (Hint: they can’t.)
Why are so many companies sending out emails to customers that look like phasing attempts? Don't they pay attention to their own security efforts?
When McDonald's in March suffered a global outage preventing it from accepting payments, it issued a lengthy statement about the incident that was vague, misleading and yet still allowed many of the technical details to be figured out.
Wall Street’s obsession with quarterly earnings has made it extraordinarily difficult for most enterprises to spend on long-term investments, or even mid-term investments.
Ever use one of those mobile food delivery apps — only to realize your delivery person isn't who you expected? There's a lesson here about identity, authentication, and what happens when the best laid tech plan meets human beings.
The IT community is freaking out about AI data poisoning. For some, it’s a sneaky backdoor into enterprise systems as it surreptitiously infects the data LLM systems train on — which then get sucked into enterprise systems.
The New York Attorney General’s office sued Citibank for failing to reimburse customers victimized by fraud, raising serious issues all enterprises must figure out. When should a customer be reimbursed for fraud? And at what point do a customer....
One of the oldest and most frustrating rules about email spam is that the unsubscribe link never works — all it does is confirm your email address is active. But what if the unsubscribe failure is caused by something far more problematic?
It's no secret that enterprise IT in recent years has been disappointed in corporate clouds. But in general they've not done anything about it. That could soon change.
As generative AI fever continues to mesmerize enterprise executives, those same execs are insisting that IT somehow make it happen.
When Google rolled out its latest biometrics specs for Android devices, its top-level 'strong security' option allowed “a spoof and imposter acceptance rate not higher than 7%.” Most biometrics specialists argue that's muc....
The idea that vendors lie a lot is, as the saying goes, “a tale as old as time.” But to suggest vendors are so persuasive because they actually believe their falsehoods — now, that's intriguing.
Zoom stirred up a kerfuffle this month when it amended its terms of service to make execs comfortable that it wouldn’t use Zoom data to train generative AI models. In reality, it was really doing spin control worthy of the sleaziest politician.....
As details about the recent China attack against US government agencies come to light, two details stand out: Microsoft failed to store security keys properly — and the keys were used by attackers even though they'd already expired.
In many ways, lawyers, CIOs and CISOs have the same mission: protect the enterprise from forces that want to do harm. But those two professions often approach the task in such polar opposite ways that they fight each other instead of the bad guys.
Gaining visibility into anything IT-related is always difficult, but the age-old nemesis, shadow IT, remains a major problem — especially as the enterprise environment has changed.
If coders lied as often as ChatGPT, they would be fired immediately. Stunningly, some enterprise execs seem to be just fine with that — as long as AI continues to code quickly and for so little money.
Sponsored Links