Evan Schuman

Evan Schuman has covered IT issues for a lot longer than he'll ever admit. The founding editor of retail technology site StorefrontBacktalk, he's been a columnist for CBSNews.com, RetailWeek, Computerworld and eWeek and his byline has appeared in titles ranging from BusinessWeek, VentureBeat and Fortune to The New York Times, USA Today, Reuters, The Philadelphia Inquirer, The Baltimore Sun, The Detroit News and The Atlanta Journal-Constitution. 
Posts by Evan Schuman

How Safe Is It Letting Google And Apple Be Your App Security Team?

November 10, 2016  | Security News

Malware threats are ever-present in mobile and this needs to be a top concern for IT execs, as they continue to issue millions of mobile devices to enterprise workers daily. An interesting piece ran in late October at TechTarget examining the protections—or lack of same—that exist for Android apps. It was a legitimate exploration of the issue and it noted that protections are much... READ MORE

Can Security And The App Economy Learn To Get Along?

November 1, 2016  | Security News

The App Economy is streamrolling along and has the very legitimate potential to rewrite so much of how businesses use technology. Uber obliterated Yellow Taxis, Pandora and Spotify has all but made FM radio irrelevant and streaming video has forced TV and movie theaters to sit in the back seat. But here's the frightening part: Security has also been demoted. Consider a recent study where,... READ MORE

*Sigh* More Proof Of App Weak Security

October 27, 2016  | Security News

It's becoming increasingly clear to IT how critical it is to keep applications secure. One problem, though, with keeping apps secure is making sure that they at least started out secure, which is harder than it should be. Consider this scary piece from Engadget where they found that security in the mobile Android world—specifically apps in Google's Play Store—is rather... READ MORE

The App Security Battle Is Winnable, But Only If You Suit Up

October 20, 2016  | Security News

How dangerous are your app security holes? Sadly, they are quite dangerous and getting far more so. In a study released Tuesday (Oct. 18) that examined billions of lines of code from 300,000 assessments performed over the last 18 months, a stunning 97 percent of Java applications contained at least one component with a known vulnerability. To be fair, that probably isn't that surprising. Nor... READ MORE

Message Encryption Is Great—Depending On Who Has The Key

October 14, 2016  | Security News

Corporate execs are understandably worried these days about all of their electronic communications. Whether messages can be intercepted by corporate spies working for the opposition, government investigators snooping for terrorists or cyberthieves looking to steal what they can get, anything that is intercepted can wind up somewhere else. See Edward Snowden. It's therefore quite... READ MORE

Has The Media Finally Figured Out The Importance Of App Security?

October 7, 2016  | Security News

It certainly has taken long enough, but it seems like non-tech media outlets have figured out that applications make wonderful entry points for cyberthieves. Given the layers of complexity that many enterprise apps feature today, it's hardly surprising that they boast massive security holes. That message seems to be finally sinking in. Consider just a few recent media reports, from NBC News... READ MORE

Why Apple Won't Ever House A Security Backdoor

October 3, 2016  | Security News

Much has been written about Apple's official stance against giving law enforcement an encryption backdoors into its customers' files. And Apple's firm position against a backdoor has been painted as a marketing decision, as it gives people a really good reason to buy Apple devices instead of Android or something else. On top of that reality is the argument that a backdoor isn't... READ MORE

Security's Weak Communications Skills Can Undermine Safety

September 23, 2016  | Security News

It's hardly a revelation that hardcore security veterans are not at the pinnacle of clear communication. And the more technical the talent, in general, the weaker the communication. For most in IT and almost everyone in corporate outside of IT, this is generally dismissed as a fact-of-life. But I've recently started to wonder if this isn't a bigger problem and one that can undermine... READ MORE

Could How A Shopper Types Be The Best Authentication?

September 20, 2016  | Security News

It's not what you say, but how you say it. That piece of advice, which has given to countless politicians and executives over the decades, might be the premise behind an intriguing knew approach to biometric authentication. Although to be precise, it's closer to "It's not what you type, but how you type it." The value of any authentication system is based on a balancing act... READ MORE

Why Age Verification Needs To Be A Key Part Of Your Security Strategy

September 8, 2016  | Security News

Not only is e-commerce being radically changed due the mobilization of shoppers, but it's disproportionately happening with younger consumers. At the same time, law enforcement and government regulatory attention is being focused on age violations. And yet, the vast majority of companies have age-verification systems that provide almost no legal protections. Consider Facebook's recent age... READ MORE

Love to learn about Application Security?

Get all the latest news, tips and articles delivered right to your inbox.

 

 

 

contact menu