Wayne Rash

About

Wayne Rash is a content writer and editor with a 35-year history covering technology. He’s a frequent speaker on business, technology issues and enterprise computing. He is the author of five books, including his most recent, "Politics on the Nets." Rash is a former Executive Editor of eWEEK and a former analyst in the eWEEK Test Center. He was also an analyst in the InfoWorld Test Center and editor of InternetWeek. He's a retired naval officer, a former principal at American Management Systems and a long-time columnist for Byte Magazine.

Microsoft CEO Says Privacy a Basic Human Right, Calls for Global GDPR

Microsoft CEO Satya Nadella renewed his company’s call for privacy on a global basis at the World Economic Forum in Davos, Switzerland. Speaking during an on-stage interview on Jan. 24, Nadella said that he sees privacy as a basic human right. He also said that he hopes the United States can adopt privacy laws similar […]

Why 2019 Might Be the Year of the Delivery Robot

We’ve been hearing stories about airborne deliveries by autonomous drones for a few years now. The Amazon drone is already a staple of technology stories. But it looks like another drone-like delivery method might end up being the one that is actually used. It’s the delivery drone that Amazon has just announced, called the Amazon […]

EU’s €50 Million Fine vs. Google: Sign of More to Come

European regulators have fined Google and its parent company Alphabet €50 million in response to a complaint filed on May 25, 2018 saying that Google failed to meet the requirements of the GDPR in regard to its privacy practices. In this case, the complaint was in regard to the company’s Android mobile software, and it […]

Why Government Shutdown May Have Permanently Damaged U.S. Security

 As you read this, there’s a virtual certainty that nation-state actors who intend to harm the United States have already invaded critical networks and computing facilities. Those same actors may have begun downloaded secure databases, they may be traversing networks looking for classified information, and they may be laying traps for federal workers when they […]

Why Enterprises Need to Crack Down on Lazy Logins

Everybody does it. You do it. It’s the easy way out, but it’s also an easy way to a security blunder. The “it” in this case is using your email address as your user name for websites and other places where a login is necessary. Chances are you use one of a couple email addresses […]

How Enterprises Need to Handle Today’s Threat Landscape

When I wrote about avoiding the Ryuk ransomware a few days ago, one of the characteristics new to most IT professionals was the idea that the attack would be managed in person by a cyber-attacker. Normally when we think of malware, including ransomware, we think of it spreading using the old computer virus model. But […]

Why Quantum-Resistant Encryption Needs Quantum Key Distribution for Real Security

The idea behind the use of quantum computers to break encryption lies in the fact that the encryption keys used by current encryption methods depend on a secret key that is used to encrypt and decrypt the information that’s being protected. Those keys are long, random—or, more likely, almost random—numbers that are shared between the […]

How Government Shutdown Brings Both Risk, Opportunities to IT

For federal cyber-security workers, the options at this time are bleak. A few are being told that they’re required to continue to work during the current government shutdown that began on Dec. 21, 2018, but they won’t be paid for that work until the government resumes operation and maybe not even then. Meanwhile, the majority […]

Election Security Bills Finally Progressing in Congress

After years of contention about real and imagined security attacks on U.S. elections, the U.S. House of Representatives is expected to consider and then pass H.R. 1, also known as the “For the People Act of 2019,” which includes provisions that would improve election security and help states improve their voting systems, as well as […]

Biometric Security Can Be Hacked, but It’s Really Hard to Do

At the end of December 2018, security researchers in Leipzig, Germany, demonstrated at a security conference their method of hacking a biometric security system that depends on reading the pattern of blood vessels in the palm of the hand. This method of vein authentication involves reading the details of the veins just below the skin […]