Tony Bradley

Tony is principal analyst with the Bradley Strategy Group, providing analysis and insight on tech trends. He is a prolific writer on a range of technology topics, has authored a number of books, and is a frequent speaker at industry events.

6 disaster recovery do’s and don’ts from Hurricane Katrina survivors

The disaster-recovery lessons we learned after Katrina

The disaster-recovery lessons we learned after Katrina

The destruction of the hurricane itself, and the subsequent flooding that put most of New Orleans underwater knocked many businesses out of commission—and more than a few completely out of existence. Thankfully, we have learned a lot...

10 years after Hurricane Katrina: IT lessons learned

10 years after Hurricane Katrina: IT lessons learned

Ten years after Katrina devastated New Orleans, IT pros say being less dependent on physical locations is just one of the keys to ensuring your company doesn’t go out of business when disaster strikes.

Businesses ill-prepared to defend against dramatic rise in zero day attacks

Businesses ill-prepared to defend against dramatic rise in zero day attacks

The Check Point 2015 Security Report highlights a number of key security trends--including the impact of the rise of zero day attacks against organizations.

Entrust Offer New Certificates in Wake of Heartbleed

The Internet was rocked this week by revelations that a critical vulnerability in OpenSSL has left Web traffic open to compromise for years. The Heartbleed bug has potentially serious security ramifications, and it's difficult--if not...

What You Need to Know About Heartbleed and OpenSSL

You know that little padlock icon you look for to ensure your Web traffic is encrypted and secure? It turns out that you might not be as secure as you think thanks to a vulnerability that was accidentally introduced into the code of...

Alert: Your Password is Probably Compromised...Again

Hackers have exposed millions of passwords from Facebook, Google, and Twitter. Sadly, password compromise is so common that it barely even registers as news any more. Suffice to say that it's probably time to change your password...

Shadow IT is Undermining Your Security

Once upon a time, not so long ago, the IT admin chose exactly what hardware and software would be used by employees. Recent trends like the consumerization of IT and BYOD (bring your own device) have shifted the balance of power, but...

Prepare for Cyber Monday Security Concerns

In a couple days the United States will celebrate Thanksgiving, and Black Friday--the official launch of the 2013 holiday season will go into high gear. Traditionally, the Monday following Thanksgiving is Cyber Monday--the day the...

The More You Know, the Less Likely You Are to Be a Victim of Cybercrime

Cybercrime is more costly than most organizations realize, and those costs are continuing to rise. The cost per victim has increased 50 percent, and the total cost of cybercrime is a staggering $113 billion--with a "B." One way to...

6 Tools That Help Businesses Tame Twitter

6 Tools That Help Businesses Tame Twitter

Twitter can be a valuable resource, but only if you manage it effectively. We look at six tools that can help cut through the noise.

6 Tools That Help Businesses Tame Twitter

Twitter can be a powerful business tool, not to mention a valuable source of metrics data and feedback. If not managed properly, though, Twitter tweets can quickly become overwhelming -- sifting out the nonsense to get to the nuggets...

Load More