

Jack Gold
star Advisor
IDG Contributor Network
Want to Join?
Opinions expressed by ICN authors are their own.
Jack E. Gold is founder and principal analyst at J. Gold Associates, LLC., an analyst firm in Northborough, Mass. With more than 45 years of experience in the computer and electronics industries, and 25 years as a tech industry analyst, he covers the many aspects of business and consumer computing and emerging technologies.
Follow Jack on Twitter at @jckgld and on LinkedIn.
The opinions expressed in this blog are those of Jack Gold and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Why you're probably doing endpoint security all wrong
The traditional combination of username and password to secure company devices and systems is outdated and could be putting your business at risk. Employing an AI based continuous identity management system could eliminate nearly all...

Data security vs data privacy – they’re not the same thing
Data security and data privacy are both necessary to completely protect corporate data assets. But most companies spend most of their time on the former and much less on the latter.

Why you need an integrated data lifecycle solution
Data may be the new oil, but do you know how to drill for it? There are many stages in a data lifecycle, which is why you need a way to deal with the entire lifecycle – from drilling to production.

Is everything you thought you'd done right for security about to be at risk?
It may still be early days for quantum computing, but there has been significant progress recently. But what does that mean for today’s 'unbreakable' encrypted data?

Mobile security failings putting enterprises at risk
A typical mobile security breach in a large organization can cost millions of dollars. Mobile Security can be a daunting task with many potential pitfalls to protect against. Knowing the key security exposure mechanisms can help you...

Is there a private 5G network in your company's future?
The continuing build out of 5G networks has made it available to many users, although expect it to be another 1-2 years before it is ubiquitous. But, there are stopgap alternatives.

5 lessons companies should learn about working at home
Companies now have the opportunity to learn from what is and isn’t working during the coronavirus crisis. Use this time to build out a strategy so you won’t have to use band aids and duct tape next time.

Will Microsoft provide the operating system that enables 5G?
While most of the focus around 5G has been on the network operators and infrastructure providers, there’s been an 'under the covers' war being waged on who will power the massive computing core of the new networks.

Is enterprise security broken?
Deploying independent endpoint or network security separately is coming to a rapid – and much-needed -- end. If you want to stay secure longer-term, focus on unifying your security products now.

Coronavirus: What companies are ready for our new reality?
One class of companies is already equipped to work in a fully distributed employee model. Another going to have a difficult time adapting to most employees having to work from home. Some won’t survive if this lasts more than a few...
