Black Hat survey reveals a disconnect between losses and security program focus

The Black Hat study focused on the concerns of practitioners, including how they actually spent their times and the ...

Five steps to optimize your firewall configuration

95% of all firewall breaches are caused by misconfiguration. Here's how to address the core problems.

Of Black Hat and security awareness

The annual security conference was a chance to go deep. But back in the office, how do you get 100% of the company’s ...

CIOs embrace hybrid cloud and software-defined data centers

CIOs say they are purchasing VMware virtualization software to support mobile applications and content for rapidly ...

Who's really in charge at Cisco?

Key innovators continue to report to Chambers, not new CEO Robbins, which signals that Cisco is not willing to part ...

CSO burnout biggest factor in infosec talent shortage

The real cause of the talent shortage in the information security field isn't a lack of new people entering the ...

Telstra’s ‘five knows of cyber security’

Telstra lives by ‘five knows of cyber security’ when it comes to protecting information across the organisation, ...

Questions to ask before you hire an agile coach

Before you hire an independent agile coach, ask yourself this: Do I already have the knowledge and experience in-house?

How to select enterprise software that maximizes ROI

Selecting best-fit enterprise software is a difficult task, and you can’t please all the people all the time. This ...

Why social media could swing the 2016 presidential election

Candidates in the 2016 U.S. presidential election use more social networks than politicians of the past, in hopes of ...

Cyber security culture is a collective effort

Many believe that cyber security culture starts from the top and works its way down. While there is merit to this ...

The incident response plan you never knew you had

Five strategies to give your incident response plan a headstart by using key components of the business existing ...

Security education on phishing can save companies millions

A new research report by Ponemon Institute finds that a comprehensive security training program with a continuous ...

Top 5 characteristics of the best business analysts

A look of the top five characteristics that the best of the best business analysts bring to the table.

Most corporate risk due to just 1% of employees

Just 1 percent of employees are responsible for 75 percent of cloud-related enterprise security risks

Do you really need VDI? Try desktop as a service instead

Running Windows desktops from the cloud instead of your data center opens more possibilities for managing distributed ...

How Georgia successfully overhauled IT

COO of Georgia Technology Authority discusses the sweeping enterprise-driven privatization push that's improved ...

Smart refrigerator hack exposes Gmail login credentials

A bonus feature on a smart home product becomes a security liability.

What golf teaches us about evaluating legacy systems

A decade ago, a 72-hole score of 10 under par could win the PGA championship. Today, it’s a new game, where 20 under ...

If you measure it, they will come!

Measurement is critical for successful intranets and enterprise social technologies. Meaningful results are ...

How the cloud improves security for everyone

Reflecting on the insights and discussions of the Leading Security Change series reveals a clear benefit of moving to ...

Intel to pilot cloud technology for sharing personalized cancer treatment

With the Collaborative Cancer Cloud, Intel hopes to remove barriers that keep personalized medicine from scaling

Data analytics help doctors develop cancer treatment plans in a day

The Collaborative Cancer Cloud will leverage big data analytics to help medical institutions sequence individuals' DNA ...

X marks the spot for digital transformation

Getting customer experience right is becoming a make-or-break for many businesses. And best-in-class digital ...

Why every business needs a WISP

Non-compliance is a risk, and the Attorney General's office carries a big stick for those who don't follow the rules.

The hazards of go-to people

Every IT manager wants to have a star performer who can reliably be turned to in a crisis. Just don’t see everything ...

Customer service: The proof is in the numbers

Customer satisfaction increases when you find your greatest weaknesses and then hone in with a laser focus to address ...

CIO enjoys dual role of cloud strategist and company pitchman
Microsoft's new Edge browser: Boon, bust or both?

How to get security right when embracing rapid software development

Five steps to reduce risk while moving to continuous updates

How data analytics helps managers be more effective

Big data is helping managers more effectively hire and retain top talent, reduce turnover, and improve diversity in the workplace.

Flash is the future storage of datacentre : Ravi Naik,SanDisk

Flash empowers CIOs towards instant access to applications anytime, anywhere, any device and at a lower cost to manage sprawling data pool says Ravi Naik, SVP & CIO, SanDisk.

How double-duty CIOs cope with non-IT responsibilities

CIOs who take on additional business functions are impressive, but how do they they do it all without having a nervous breakdown? The answer: great teams, trusted deputies.

Perpetuuiti empowers CIOs to realize the real value of IT : Rohil Sharma

Our solutions determine the downtime cost to keep businesses running as CIOs struggle with time-to-market and IT budgets, says Rohil Sharma, President & CEO, Perpetuuiti.

CIOs create formal processes to get innovative tech from startups

IT leaders can get an innovation injection by tapping into the startup ecosystem via tech incubators, advisory boards and word of mouth
.

How Polaris saved 1.3 million unproductive hours by going social

UnMail, earlier known as Octopus, is the newest ESN in town. A product of IDAL of the Polaris Group, it helped the company reduce attrition and support calls, and increase ...

How NextDrop is solving urban India’s water woes

NextDrop’s smart solution informs users of water supply in their area and takes water management to the next level.

Facial recognition wouldn't have prevented the murders of two WDBJ reporters

Security vendor uses tragic murders as promotional tool for new product

How HP used big data to optimize its fleet of 6,000 vehicles

When you own 6,000 cars, any efficiencies you can gain equate to big bucks

You built a cloud and now they want containers, too?

Some critical controls are still missing, but container tech is already paying dividends

When to throttle yourself as a new CISO

"Cybersecurity Exhaustion" across the enterprise can get you out the door sooner than expected as a new CISO

How Not to Anger a CIO

What pleases a CIO? Well, it is team work and backing him when in choppy waters. Here are the takeaways. 

Tech’s Holy Grail: IT can’t afford to choose poorly

When we’re surrounded by “next big things,” how does IT decide what to choose and what to do with that choice?

Why the world's top computing experts are worrying about your data

'We are living in a black box society,' one scientist said

Theft of devices having patient data remains a major security threat in healthcare

Nandkishor Dhomne, CIO, Manipal Health Enterprises, highlights the challenges surrounding security and how to enlighten business about its significance. 

LATEST
: :

How double-duty CIOs cope with non-IT responsibilities

CIOs who take on additional business functions are impressive, but how do they they do it all without having a nervous breakdown? The answer: great teams, trusted deputies.

Flash is the future storage of datacentre : Ravi Naik,SanDisk

Flash empowers CIOs towards instant access to applications anytime, anywhere, any device and at a lower cost to manage sprawling data pool says Ravi Naik, SVP & CIO, SanDisk.

How the cloud improves security for everyone

Reflecting on the insights and discussions of the Leading Security Change series reveals a clear benefit of moving to the cloud that improves security for everyone

Leaked Uber investor presentation shows 2015 bookings totaling almost $11 billion

The ride-hailing company reportedly could go public in 18 to 24 months

What golf teaches us about evaluating legacy systems

A decade ago, a 72-hole score of 10 under par could win the PGA championship. Today, it’s a new game, where 20 under par clinches the trophy. As in golf, the right software and information technologies – when used strategically by skilled pros – can make a business more competitive. Here are some pro tips for evaluating legacy systems.

The FitNatic Nourish, and other cautionary crowd-funding tales

Revelations of the sketchy track record of two members of the FitNatic team prompted us to look back at successful crowd-funding campaigns that failed to deliver.

If you measure it, they will come!

Measurement is critical for successful intranets and enterprise social technologies. Meaningful results are demonstrated by business use case measures that solve meaningful business problems.

Transform your business or pay the price

There is more pressure than ever on CIOs to capitalise on digital opportunities. Traditional, well-established business models are being swept aside by more nimble and agile businesses created through digital innovations.

How much should a new cloud financial management system cost?

With many companies moving their financial management to the cloud, there are many questions around what the cloud solutions cost and how they are 'priced' compared to traditional on-premise solutions. To add to the confusion, legacy vendors are getting creative on how to keep their customers on their existing system or sole source convert them to their 'cloud' application. This article de-mystifies that process.