Wayne Rash

About

Wayne Rash is a content writer and editor with a 35-year history covering technology. He’s a frequent speaker on business, technology issues and enterprise computing. He is the author of five books, including his most recent, "Politics on the Nets." Rash is a former Executive Editor of eWEEK and a former analyst in the eWEEK Test Center. He was also an analyst in the InfoWorld Test Center and editor of InternetWeek. He's a retired naval officer, a former principal at American Management Systems and a long-time columnist for Byte Magazine.

Why Supply Chain Security a Serious Enterprise Problem

In their 2015 novel “Ghost Fleet: A Novel of the Next World War,” authors P.W. Singer and August Cole postulate a future conflict between the U.S. and China that’s enabled by supply chain hacking. But rather than suggesting that Chinese agents somehow inserted a secret chip into a few servers, they take the far more […]

Why CISOs Fumble With Understanding Security Needs

AUSTIN, Texas—A set of new polls conducted within the IT industry shows that spending on IT security is slightly up, but that plans for future spending are for initiatives that are actually symptoms of a larger problem. Another survey of chief information security officers shows that spending is unfocused due to a lack of leadership […]

Learning Security Protocols From the OODA Loop

AUSTIN, Texas—When a fighter pilot is in a dogfight, a specific set of skills plays a role in whether the pilot survives the encounter. One set of those skills is a particular way of reacting to what’s going on during the aerial competition. Those same skills can also help you deal with security threats. According […]

A Chip Off the Old Computer

The story in Bloomberg Businessweek was lurid in the extreme. It read like an Ian Fleming novel, included stylized images of computer circuit boards and had pictures of a tiny chip. What happened, according to the story, was that Chinese hackers working for that nation’s military had found a way to insert a tiny surveillance […]

New Rules for Facebook Business Use

The first word that comes to mind when considering last week’s breach of Facebook is “damn.” Meaning, in this case, that you’re damned if you do and damned if you don’t. Facebook has become a valuable tool for customer engagement, but as last week’s breach makes clear, the social network is also fraught with risk. […]

DOJ Suit Against California Deepens Net Neutrality Quagmire

The U.S. Department of Justice is about to take on the state of California in a battle that is sure to muddy the already murky waters surrounding net neutrality. At stake is both the definition of that neutrality and the limits of a state’s ability to regulate the internet. The basis of the questions involved […]

New Russian Malware Can Embed Itself in PC Firmware

Researchers at security company ESET say that they have found a new type of malware that embeds itself into a computer’s firmware, where it eludes discovery and from where removal is very difficult. The firmware can withstand all normal methods of discovery, it can’t be removed by anti-malware products, and it will survive the reinstallation […]

FCC Limits Local Government Ability to Restrict 5G Deployment

Local governments are no longer allowed to restrict the deployment of small-cell wireless infrastructure sites in ways that the FCC considers unreasonable. To accomplish this, the Federal Communications Commission on Sept. 26 placed limits on restrictions localities can place on cell infrastructure, and strict shot clocks of 60 and 90 days for consideration of applications […]

Series 4 Apple Watch Is More Than Just a Toy

UPDATE: Four days after this review was published, the Apple Watch used in the review stopped working, and there was no remedy readily available. T-Mobile, from whom we purchased the Apple Watch, declined to replace it, so the now non-functional device is being returned. When cartoonist Chester Gould outfitted his legendary detective, Dick Tracy, with a […]

Why the iPhone XS Is More Than a Minor Upgrade

While the new iPhone XS looks just like the iPhone X it replaced, there’s a lot inside that’s new, including better wireless technology. When you take the iPhone XS out of the box, it’s a disappointment. The shiny new iPhone that you just spent all that money on looks just like the iPhone X that […]