Security

Subscribe Archives >
 

Disarming Hidden IT Project Time Bombs

6 days ago | by Guest Author

How can you tell whether an IT project will be a boon or a bomb? And how can you spot the land mines in time to change course? Three disciplines can help. Read More

 
 
 
 
 
 

LATEST STORIES

  • Securing Public Clouds Can Be Challenging
     
    Despite clear concerns about their abilities to secure infrastructures in a public cloud, companies continue to forge ahead with plans to run their applications in infrastructure-as-a-service (IaaS) environments. Such are the findings of a recent...
     
    READ MORE
     
  • Do Companies Sacrifice Security for Productivity?
     
    Balancing productivity and security is a growing minefield for organizations, particularly as the consumerization of IT accelerates and BYOD (bring your own device) reaches deeper into the fabric of companies. A recent report, "Security in the New...
     
    READ MORE
     
  • Companies Struggle to Deal With Insider Threats
     
    One of the biggest business and technology challenges facing enterprises that are attempting to batten down the security hatches is the ongoing peril of insider threats. In some cases, these breaches occur inadvertently, when employees engage in...
     
    READ MORE
     
  • BYOD Policies Are MIA at Many Organizations
     
    Given the potential that mobility has to significantly affect enterprise operations and security, you would probably expect that more organizations would adopt comprehensive policies supporting their bring-your-own-device (BYOD) initiatives....
     
    READ MORE
     
  • Easy Access to Apps Improves Productivity
     
    An identity and access management system enables the Susan G. Komen organization to streamline access to cloud applications, while safeguarding sensitive data.
     
    READ MORE
     
  • IT Execs Target Mobility's Business Potential
     
    IT leaders express overall satisfaction with the adoption of mobile applications within their companies, according to a recent survey from Apperian. And the resulting "2014 Executive Enterprise Mobility Report" reveals that CIOs have high hopes...
     
    READ MORE
     
  • The Growing Need for Cyber-Security Professionals
     
    While the need for cyber-security professionals may outweigh supply, it's important to remember that several IT skills and personality traits are transferable.
     
    READ MORE
     
  • Treading the Line Between Security & Productivity
     
    Baptist Health's security plan encompasses two key issues: making printers secure and making security easy to implement so it does not decrease productivity.
     
    READ MORE
     
  • Protecting the Business With Next-Gen Firewalls
     
    A quarter century after the firewall was invented, companies are turning to sophisticated next-generation technology to address growing cyber-security risks.
     
    READ MORE
     
  • Are C-Level Execs Disparaging CISOs?
     
    It wasn't that long ago that the CIO's place in the C-suite was questioned, and the role was marginalized by other executives who felt CIOs should just focus on software and hardware. Well, that attitude is nothing compared to the beating chief...
     
    READ MORE
     
 
 
 
 
 

Security Archives >

 
 
Manage your Newsletters: Login   Register My Newsletters



















 
 
 
 
 
 
 
 
 
 
Thanks for your registration, follow us on our social networks to keep up-to-date