Protecting Against Third-Party Code Exploits
By Samuel Greengard Hardly a day goes by without news of another high-profile security breach. In December, Internet content provider Yahoo! found itself squarely in
By Samuel Greengard Hardly a day goes by without news of another high-profile security breach. In December, Internet content provider Yahoo! found itself squarely in
By Tony Kontzer There was a time when improving a company’s energy efficiency was similar to conserving energy at home: Remember to turn off the
By Samuel Greengard It’s hardly news that mobility is driving enormous changes in government and business. However, a recent study conducted by Telework Exchange demonstrates
By Samuel Greengard Few would argue that Internet-based security risks are growing, but there’s some disagreement about what type of attacks represent the biggest risk.
By Eileen Feretic Imagine a business that has implemented analytics, mobile, social, cloud and cyber technologies in one cohesive, mature ecosystem. That’s how Deloitte envisions
By Samuel Greengard Over the last year or so, the buzz over big data has reached deafening proportions. It’s hard to go a day without
By Robert LeCount If you are in charge of your IT department, at some point you’re going to have to speak to the media. If
By Samuel Greengard Over the last few years, as the use of mobile technology has spiked and consumer devices have invaded the enterprise, business and
By Samuel Greengard Rapidly advancing technology and conflicting attitudes about privacy have created enormous challenges for organizations. Sorting through all the issues and arriving at