2013 Was a Year of Big Data Breaches
Published on January 20, 2014
There are plenty of reasons for a business to make sure its data is secure. Not least of these is avoiding the embarrassment of landing in a conspicuous spot on one of the many "Top Ten Worst Data Breaches of 2013" lists. Some breaches come…
Image Recognition – Multi-factor Security
Published on November 14, 2013
Do you recognize this image? As we've discussed before on this blog, multi-factor authentication is an essential part of a secure system. Passwords alone, even sufficiently complex ones, are useless if stolen. And other authentication methods like fingerprints are often not an ideal setup for…
No News Is Bad News
Published on October 7, 2013
Technology executives run the risk of believing that no news is good news Since IT and mainframe managers are so used to SMS and email alerts warning them of system malfunctions, it becomes harder to seek out and solve the problems that are not glaringly…
Big Data Protection: Six Elements You Must Have
Published on September 25, 2013
Big Data can be a high-stakes game. Here's how to minimize your chances of losing. The revelations of the reach of the NSA's PRISM program revealed to the world just how critical privacy, security, and encryption are. Many users discovered that data and communication which…
Interviewing Mainframe Candidates: Asking the Right Questions
Published on September 17, 2013
Our last post looked at finding the next generation of mainframe talent for your organization. Here's what to ask before you hire them. Recruiting talented individuals to work on mainframes is an ongoing challenge for many organizations. With an aging workforce, few educational programs training…
Recruiting mainframe talent
Published on September 4, 2013
Mainframes aren't going away. Here are some thoughts on how to find and help the next generation of mainframe talent in your company. Mainframes aren't going anywhere. They will continue to serve as the technological backbone of large organizations for years to come. However, there…
Establishing a culture of security
Published on August 29, 2013
Great software is vital. But so is empowering your enterprise to use it. There are many types of software and various services that organizations can purchase to secure their systems, including encryption software, biometrics, access controls, and more. A company can also utilize training seminars,…
Got multi-factor authentication?
Published on May 14, 2013
Usernames and passwords are the most common way to secure access to software accounts and data. But passwords don't work -- at least not as well as they should, and especially not the way they used to. Sophisticated phishing schemes, brute force attacks, social engineering,…
ReACT a Hit in Las Vegas
Published on April 27, 2013
The boys are back! And they've been debriefed, after a couple days' recovery period. Everyone from ASPG had a fantastic time in Vegas--on and off the clock! They got to hand out racks of chips, meet clients face-to-face, and have sing the praises of our…
What Happens at HDI in Vegas Stays in Vegas?
Published on April 15, 2013
Not if you stopped by Booth #314 and won $100 in chips Viva Las Vegas! HDI is in full swing, and one attendee started off the show with $100 of free casino chips. Congratulations to Jason Wilson from University of California Medical Center, the winner…