83 Posts

Mark Samuels

Tech Journalist

Mark Samuels is an experienced business technology journalist with an outstanding track record in research. He specializes in the role of chief information officers (CIOs) and is adept at helping executives understand the business benefits of complex technologies. Key areas of interest include innovation, digital transformation, cloud computing, mobility, information security, ecommerce and big data. Mark has written articles for national newspapers, including The Guardian, The Times and The Sunday Times. He has also produced features and columns for a range of IT trade publications, such as Computer Weekly, ZDNet, Tech Republic, IT Pro, Channel Pro, CBR and The Register.

Written By Mark Samuels

Avoid Becoming Cybersecurity News by Examining Providers, Gartner Advises

To avoid becoming the next piece of cybersecurity news, IT leaders must assess the security posture of third-party providers.

Threat of Phishing Attacks Increases With Bitcoin Price Hike

A surge in the value of bitcoin has been accompanied by a rise in the risk of phishing attacks against the cryptocurrency ecosystem.

Fresh Additions Give PHP Programming a Business Boost

The latest version of the PHP programming language provides support for improved password hashing and high-speed cryptography.

Amazon GuardDuty Provides Intelligence on Security Threats

A new threat detection service known as Amazon GuardDuty aims to help protect Amazon Web Services (AWS) users from security risks as technology evolves.

Enterprises Must Evolve Beyond Two-Factor Authentication to Secure Verification

IT decision-makers need to evolve beyond two-factor authentication and design new ways to make the user verification process intelligent and risk-aware.

Security Patches Help IT Managers Address Microsoft Vulnerability

Microsoft released security patches to deal with a 17-year-old flaw that could be exploited to remotely initiate malicious code on all Windows versions.

Public Key Infrastructure Concerns Raise Questions Over Internet Authentication System

According to a recent paper, threat actors are abusing the code signing process associated with public key infrastructure and evading antivirus detection.

Business Leaders Must Wake Up to the Risk of Shadow IT

According to a recent survey by Symantec, the risk posed by shadow IT is growing, and CIOs are in denial about the scale of the problem.

Photo-Based Pixie 2FA System Takes Authentication to a New Dimension

Researchers at Florida International University and Bloomberg have generated a new 2FA system that relies on an individual taking a picture of an object.

Security Vulnerability Puts Linux Kernel at Risk

A security vulnerability in the Linux kernel could allow external attackers to escalate privileges and execute malicious code.