IT Specialist Blogs

rss

News, Topics and Opinions on Information Technology

Specify Alternate Text

Big news in the cloud cybersecurity world. Ciphercloud has just raised a major Series B round of $50 million dollars. Transamerica Ventures led the round, joined by Delta Partners, and existing investors Andreessen Horowitz and T-Venture, the venture capital arm of Deutsche Telekom. This Series B is on top ...

Specify Alternate Text

While all the recent hype on Apple has focused on their new iPhone 6 release, Apple is beginning to make a push into the enterprise. And they’re doing so in a rather unusual partnership. The maker of the ultimate snazzy B2C focused products is teaming up with IBM in ...

Specify Alternate Text

As revelations about NSA spying and an exponential increase in malicious hacking continue to come out, more and more people are concerned with the security of their online communications, especially e-mail.  One startup taking advantage of the general trend towards people and companies wanting increased privacy is secure e-mail app ...

Specify Alternate Text

In an earlier post, I profiled document security technology firm docTrackr. docTrackr is a startup out of Boston that provides enterprises with the ability to track all of their e-mail attachments once they have left the corporate firewall. The company's technology allow company employees to track who has opened their ...

In a previous post, I profiled Israeli venture capital fund Jerusalem Venture Partners, and highlighted their fantastic track record investing in Israeli cybersecurity startups. Just as an example, JVP was also an investor in two Israeli cybersec startups that received major investments from GE and IBM. In the ...

Those who harbor doubts about the Federal Government’s ability to implement complex projects have surely had these beliefs by the recent failed rollout of the Obamacare website – an epic IT disaster if there ever was one.  Now comes further news that confirms – albeit in a less dramatic ...

In a previous article on the explosive revelations on the NSA's spying program, I outlined how the Tor browser can allow you to surf the internet anonymously. Tor is much safer then the commonly used browsers such as Chrome or Internet Explorer, as Tor uses both encryption as well as as ...

As the revelations of widespread spying by the US National Security Agency (NSA) continue to emerge, everyone from IT professionals to ordinary people are asking one basic question: Is it possible in the internet age to retain some level of anonymity, or is it true that, as Sun Founder ...

In previous articles on startups I highlighted some companies doing some new and exciting things in Big Data and Cloud computing. Today's innovative startup focus will be on cybersecurity startups. Needless to say, cybersecurity is one of the top concerns - if not the top concern - of enterprise IT specialists and even the ...

As any IT manager is quite aware, the entire issue of "BYOD" (or Bring Your Own Device) is front and center as a challenge these days. The reality is, employees ARE going to bring their smartphones and tablets to work, and many will want to connect to the corporate ...

Interested in submitting content for publication and syndication on the IT Specialist Network?

As a contributing writer on the IT Specialist Network, you can quickly gain exposure as an opinion leader or subject matter expert in information technology by informing a large audience of technical professionals. We welcome new and established authors that specialize in one or more sectors of the IT industry. Once your article(s) is approved for publication, it will be selectively syndicated throughout the IT Specialist Network.

Click here to contact us.