Evan Schuman

Contributing Columnist

Want to Join?
Opinions expressed by ICN authors are their own.

Evan Schuman has covered IT issues for a lot longer than he'll ever admit. The founding editor of retail technology site StorefrontBacktalk, he's been a columnist for CBSNews.com, RetailWeek, Computerworld and eWeek and his byline has appeared in titles ranging from BusinessWeek, VentureBeat and Fortune to The New York Times, USA Today, Reuters, The Philadelphia Inquirer, The Baltimore Sun, The Detroit News and The Atlanta Journal-Constitution. Evan can be reached at eschuman@thecontentfirm.com and he can be followed at twitter.com/eschuman. Look for his blog twice a week.

The opinions expressed in this blog are those of Evan Schuman and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Missing protection: Corporate B2B privacy policies

With security awareness, money talks

With security awareness, money talks

One problem with what we tell employees about taking security precautions is that the precautions interfere with their jobs.

Use LinkedIn a lot? Read its new privacy policy — carefully.

Use LinkedIn a lot? Read its new privacy policy — carefully.

At the very least, it’s a reminder that social media embarrassments are forever.

How one personal cyber insurance policy stacks up

How one personal cyber insurance policy stacks up

As policies designed for consumers emerge, the example from AIG is surprisingly comprehensive.

Bank gets lesson in the security failings of third parties

Bank gets lesson in the security failings of third parties

Brazilian bank was an easy target after its DNS provider was compromised.

Insecure security cameras sound like a joke, but aren’t

Insecure security cameras sound like a joke, but aren’t

They’re an example of big tech companies’ failure to take security seriously.

If the CIA can sidestep encryption, what makes you think cyberthieves can’t?

If the CIA can sidestep encryption, what makes you think cyberthieves can’t?

New Wikileaks documents show agents simply refining standard techniques of cybercriminals.

A better security strategy than ‘know your enemy’: Know your co-workers

A better security strategy than ‘know your enemy’: Know your co-workers

Something as simple as an uncharacteristic turn of phrase can clue people into an email’s illegitimacy.

True privacy online is not viable

True privacy online is not viable

You can hide from casual observers, but a motivated person will see through your attempts at anonymization.

Dead men may tell no tales, but IoT devices do

Dead men may tell no tales, but IoT devices do

Real privacy laws are needed in the U.S., and now more than ever with the advent of the IoT.

Bots may send your liability risk soaring

Bots may send your liability risk soaring

Judges and juries may think that a company should be better able to eliminate errors in responses with automation.

A potentially fatal blow against patent trolls

A potentially fatal blow against patent trolls

If law firms think they may be forced to pay defendants’ enormous legal bills, it could undermine the entire business model of patent trolls.

Load More