Author Archive

Kevin Jonah

Malicious maladies multiply

Pundits often throw out the phrase "digital convergence" to describe how Internet and computing technologies are changing everything from television to telephone calls.

New tools fight security flaws in wireless networking

The growth of wireless networking has brought some serious security concerns. Sometimes ubiquitous and easy access to data networks isn't a good thing.

Cast encryption in major role for secure data

The first step in keeping information locked away from prying eyes is to make it safe in transit across the networks that connect users. That means using encryption suitable to the type of information being transmitted.

Multiple firewalls defend against multiplying threats

A few years ago, the focus of network security and firewall technology was on the perimeter ? keeping bad guys on the outside from getting to systems on the inside.

A new generation for EA modeling

There are plenty of good reasons for creating enterprise architectures: Such models can take the sting out of integrating agency functions, launching new initiatives or just optimizing existing functions and IT investments.