Category Archives: IT Industry

Subscribe to IT Industry RSS Feed

More Bad Cybersecurity News - Top-Tier Malware Regin Used for Spying Since 2008

Symantec reported the discovery of new malware named Regin whose main purpose “is intelligence gathering and it has been implicated in data collection operations against government organizations, infrastructure operators, businesses, academics, and private individuals.”  On November 24, 2014 Symantec issued a report entitled “Regin: Top-tier espionage tool enables stealthy surveillance” which is a “back door-type … Continue reading this entry

Privacy at the Heart of Colossal Cybersecurity Mistakes

Infoworld reported that for Information Technolgoy (IT) “Privacy has become one of the leading computer security issues today…Today’s systems track every access, and every employee should know that accessing a single record they don’t have a legitimate need to view is likely to be noticed and acted on.”  The November 17, 2014 Infoworld article entitled … Continue reading this entry

9 Common Reasons Cloud Systems Crash: Things to Remember When Negotiating Cloud Contracts

My 2011 eCommerce Times column “Cloud Computing – New Buzzword, Old Legal Issues” reminded many folks that “the technology concept behind cloud computing has been around for more than 50 years, and the legal issues are equally old.”  Obviously the reasons Cloud systems crash are equally old news, so it would be wise to negotiate … Continue reading this entry

5 Reasons to Read “Big Data Analytics for Dummies”

Wikipedia describes “Big Data” as a broad term “for any collection of data sets so large and complex that it becomes difficult to process using on-hand data management tools or traditional data processing applications.”  Forbes identified these “5 Things Managers Should Know About The Big Data Economy” which are great reasons to read IBM’s Dummies … Continue reading this entry

VIDEO: Cyberethics in the Work Place

Wikipedia describes cyberethics as “the philosophic study of ethics pertaining to computers, encompassing user behavior and what computers are programmed to do, and how this affects individuals and society.”  To learn more about cyberethics in business, please watch my recent video entitled “CyberEthics: A Growing Business Challenge.” The video interview by Financial Management Network (& … Continue reading this entry

8 Issues of Cyber Insecurity which Lead to Cybercrime

A recent report concluded that the “cybersecurity programs of US organizations do not rival the persistence, tactical skills, and technological prowess of their potential cyber adversaries. Today, common criminals, organized crime rings, and nation-states leverage sophisticated techniques to launch attacks that are highly targeted and very difficult to detect. Particularly worrisome are attacks by tremendously … Continue reading this entry

Internet of Things (IoT) is Transforming Internet Security

IoT  means “potentially billions of devices will report data about themselves, making it possible to create new applications in areas as diverse as factory optimization, car maintenance, or simply keeping track of your stuff online” as reported in MIT Technology Review.  The IoT allows Internet communications with unique objects using Radio-frequency identification (RFID), QR codes, … Continue reading this entry

Former Employee Had Valid Access, Not Guilty of Violating Federal & State Laws

“When a former employee uses a customer’s working log-in credentials to access his former employer’s scripts, are he and the customer hackers?” No ruled a federal court which denied that the defendants violated the US Computer Fraud and Abuse Act (CFAA) and California Computer Data Access And Fraud Act (CDAFA). In January 2013 US Magistrate … Continue reading this entry

How to Avoid Doomed IT Projects

Successful IT projects are rarely noticed, only the disasters which can generally be avoided by having detailed contracts that spell out exactly what will happen, and who will do what.  Involving a lawyer with IT experience at the earliest point of IT planning (before the RFP is issued) can make sure that all things that … Continue reading this entry

Hacker Sells Secrets to the FBI and Gets 18 Months in Jail

A member of the Underground Intelligence Agency pled guilty for hacking “into multiple corporate, university and government computer networks… including access to supercomputers from a U.S. national security laboratory” as reported by Computerworld.  24 year old Andrew Miller pled guilty in August 2013 “to one count of conspiracy and two counts of computer fraud for actions … Continue reading this entry

Good Contracts Can Help Avoid ERP Disasters

The best way to avoid ERP disasters and avoid litigation is to spend adequate time to work out complete and detailed ERP implementation contracts.  It is also essential that the right individuals participate in the contract negotiations, including the business decision makers, financial leaders, IT leaders, and lawyers who are experienced in ERP negotiations. Providing … Continue reading this entry

Without Notice, a Self-Scribed Hacker's Computer is Seized

To avoid a likely disclosure of software a Judge issued an order to allow the seize of a hacker’s computer based on evidence that in the defendants’ “own words” that they ” are hackers” as reported by Computerworld. Recently US District Judge Lynn Winmill in Idaho issued an unusual order granting a motion for injunction … Continue reading this entry

IBM Cloud Revenue Investigation by the SEC

With IBM cloud revenue estimated to reach $7 billion by 2015 the revelation the SEC is investing how IBM reports creates questions that may impact all cloud providers. IBM reported that: In May 2013, IBM learned that the SEC is conducting an investigation into how IBM reports cloud revenue,…IBM is cooperating with the SEC in … Continue reading this entry

Super Users Control All IT Systems

In every IT shop someone has to be in charge of the system including all accounts, passwords, data, and security, which is endemic to IT systems and has always been the case. System administrators who have access to special user accounts are often call Super Users, because somebody has to have access to maintain operating … Continue reading this entry

Windows President Departs Abruptly

With little fanfare and soon after the launch of Windows 8, Microsoft announced the departure of 23 year veteran Steven Sinofsky which is leading to speculation that Windows 8 may not be as successful as Microsoft hoped. Also the New York Times reported that in recent SEC filings Microsoft blamed Sinofsky for failing to comply … Continue reading this entry

The Internet is an Energy Hog!

The New York Times reported that Internet sites waste huge amounts of energy and that worldwide “the digital warehouses use about 30 billion watts of electricity, roughly equivalent to the output of 30 nuclear power plants.” The study reviewed “20,000 servers in about 70 large data centers spanning the commercial gamut: drug companies, military contractors, … Continue reading this entry

eMails Costly to Samsung in Apple's $1 Billion Jury Verdict

Behind Apple’s huge verdict in the Samsung trial it’s likely that eMails may have caused the most damage to Samsung on two levels: first, Samsung destroyed eMails which led the Judge to instruct the jury that they should assume the destroyed emails were adverse to Samsung (the legal term is an “Adverse Inference”); and second, … Continue reading this entry

Samsung is Accused of Mistreating Chinese Workers

China Labor Watch (CLW) reported "illegal and inhumane violations" at Samsung’s factories in China including 7 workers under the age of 16. With all the bad press resulting from Apple’s August 2012 $1billion patent infringement victory over Samsung, the title of CLW Report says volumes: An Investigation of Eight Samsung Factories in China: Is Samsung … Continue reading this entry

Apple v. Samsung - No Infringement in Japan

Just to show how unpredictable patent infringement cases are, a week after Apple’s massive $1+ billion verdict against Samsung in California, a Tokyo Judge ruled that Samsung did not infringe a different Apple patent. Computerworld reported that Tokyo District Judge Tamotsu Shoji ruled on August 31, 2012 that Samsung did not infringe Apple’s “patent for synching … Continue reading this entry

Avoiding Disasters when Negotiating Software Development & ERP Implementation Projects

Few General Counsel and attorneys understand the important contracts terms to negotiate in order to avoid disasters when developing new software systems or implementing ERP systems. On July 18, 2012 from 12:30-1:30pm CDT my friend John DeGroote (Former Executive Vice President and Chief Legal Officer at BearingPoint, Inc.) and I will present a webcast for … Continue reading this entry