Bev Robb – BMC Blogs http://www.bmc.com/blogs BMC Software Fri, 19 Jan 2018 22:58:40 +0000 en-US hourly 1 http://blogs.bmc.com/wp-content/uploads/2016/04/bmc_favicon-300x300-150x150.png Bev Robb – BMC Blogs http://www.bmc.com/blogs 32 32 Data Breach Conundrum – Who’s on First? http://www.bmc.com/blogs/data-breach-conundrum-whos-on-first/ Tue, 12 Dec 2017 00:00:55 +0000 http://www.bmc.com/blogs/?p=11525 The first recorded data breach of our century occurred in 1984 at TRW, a credit reporting agency. One stolen password posted to an electronic bulletin board could have permitted access to the credit histories of 90 million people. Computer experts warned that prevention of such incidents demanded greater security. Thirty-three years later—the data breach conundrum […]]]> Hacking the Internet of Things – It’s as Simple as ABC http://www.bmc.com/blogs/hacking-the-internet-of-things-its-as-simple-as-abc/ Tue, 25 Jul 2017 13:40:59 +0000 http://www.bmc.com/blogs/?p=10916 Gartner estimates that 8.4 billion connected things will be in use worldwide this year, up 31% from 2016, and will reach 20.4 billion by 2020. The Internet of Things is replete with cars, electronic appliances, heating and lighting systems, medical devices, pipelines, power meters, printers, sensors, routers, security systems, smart cities, smart TV’s, SCADA systems, […]]]> Insider Threats: The Good, the Bad, and the Ugly http://www.bmc.com/blogs/insider-threats-good-bad-ugly/ Tue, 04 Jul 2017 07:10:48 +0000 http://www.bmc.com/blogs/?p=10808 Wikipedia describes an insider threat as “a malicious threat to an organization that comes from people within the organization, such as employees, former employees, contractors or business associates, who have inside information concerning the organization’s security practices, data and computer systems. The threat may involve fraud, the theft of confidential or commercially valuable information, the […]]]>