Security
Explore Articles
-
IT Leaders Aren’t Addressing Security Threats
By Patrick K. Burke Crime doesn’t pay, but it certainly costs enterprises a ton of time and money. Organizations face…
-
Security Threats Require More Action From CIOs
The daily barrage of headlines focused on security threats and data breaches has reached deafening proportions. But garden-variety breaches and…
-
Why Schools Fail at IT Disaster Recovery Efforts
Why Schools Fail at IT Disaster Recovery Efforts Disaster Recovery Preparedness 51% of respondents said they are only somewhat prepared…
-
How Shadow IT Transformed the Role of CIO
How Shadow IT Transformed the Role of the CIO New Direction 85% of CIOs and other senior IT decision-makers surveyed…
-
When Security Breaches Come From Within
When Security Breaches Come From Within Insider Threats Rule 93% of U.S. respondents say they feel vulnerable to insider attacks.…
-
Nine Facts You Might Not Know About Bot Traffic
Nine Facts You Might Not Know About Bot Traffic Bad Bots Are Rising The report’s data indicated malicious bots account…
-
$215M Scam Goes After C-Suite Executives
By Patrick K. Burke High-level business executives including CEOs and CIOs are being targeted in the latest scam initiated through…
-
Mobile, IoT Face More Complex Attacks in 2015
Mobile, IoT Face More Sophisticated Attacks in 2015 Stealthier Stealers Cyber-espionage attacks will continue to increase. Long-term hackers will use…
-
How to Deal Intelligently With Data Breaches
Data breaches are happening with greater frequency and are compromising larger volumes of data than ever before. As data breaches…
-
Wearables Will Increase Enterprise Risks
Wearables Will Increase Enterprise Risks Consumers Concerned About Breaches The majority of respondents to the survey said recent prominent data…