Security
Explore Articles
-
CIOs: Between a Cyber-Rock and a Risk Place
By Katie Graham Shannon and Phil Schneidermeyer CIOs are under more pressure than ever to accurately assess their organization’s ability…
-
11 Reasons to Choose an Automated Security System
11 Reasons to Choose an Automated Security System Why Intruders Compromise Networks Enterprises are vulnerable because they identify risks—such as…
-
The Sony Hack Reveals a Bigger Picture
The recent Sony Pictures Entertainment hack is like witnessing a slow-motion train wreck Hollywood style. Obviously, Sony’s IT systems weren’t…
-
Consumers Are Apathetic About Mobile Security
A growing number of consumers are using mobile devices to conduct transactions that put their personal identifiable information (PII) at…
-
Most IT Pros Ill-Prepared to Deal With Breaches
On the heels of security breaches at Neiman Marcus, Target and Home Depot, more and more IT leaders are expressing…
-
Hackers Increasingly Spoof Authentic Identities
Hackers Increasingly Spoof Authentic Identities Attacks Across Industries 57% of transactions were account logins. 3.1% of those were attacks. 39%…
-
Mobility Scores High Marks for Bancroft
The impact of mobile technology now reaches far beyond the traditional business world. It’s altering the way learning takes place…
-
CIOs Take a Lead Role in Risk Management
CIOs Take a Lead Role in Risk Management Formidable Barriers 65% of C-suite execs surveyed said integrating new tech with…
-
Do We Need a CDC for Cybersecurity?
By Madeline Weiss Although the U.S. Centers for Disease Control and Prevention (CDC) has emerged from the Ebola outbreak with…
-
The Enterprise Is a Target
By Jack Rosenberger The enterprise is under constant siege from cybercriminals, nation state-supported attackers, corporate spies, and other digital adversaries,…