Securing IoT Ah, security. It is the dulcet tone of a symphony that we play over and over in the IT world. IoT (Internet of Things) and the myriad of [...]
Cyber Security Threat A recent whitepaper on cyber security in the US government reveals that that the increasing number of mobile phones being used within federal agencies is escalating the [...]
Customers CAN Better Protect Themselves The majority of cloud consumers don’t understand what cloud is let alone what the implications of transacting in the cloud or of having their data [...]
China Drafts New Law State media in China today revealed that its parliament has published a draft law that will “safeguard national cyberspace sovereignty,” as well as “security and development.” [...]
Record Year For Data Breaches The news is full of data security breaches. This week, Sputnik International reported that Hacking Team had a 400 GB database stolen and published, and [...]
Simplifying Enterprise Cloud Connectivity Cost. Agility. Innovation. For the modern-day enterprise, the advantages of migrating business applications to the Cloud are many. From substantial cost savings realized through economies of [...]
Officials Train For Cyber War Banking and energy officials joined members of the Pentagon, National Security Agency (NSA) and the Department of Homeland Security for a three-week cyber war game in Suffolk, [...]
The Cloud Paradigm The cloud is not really the final destination: It’s mid-2015, and it’s clear that the cloud paradigm is here to stay. Its services are growing exponentially and, [...]
Not The Death of Traditional IT If you are a CIO, no doubt you are getting pressure from your line of business managers to provide a more agile IT environment [...]
Small and Medium Businesses Cloud Computing is the hottest issue among IT intellects of Small and Medium Businesses (SMBs). Like any other computer-orientated technology, Cloud Computing has some misconceptions and [...]
7 Main Cloud Security Mistakes Like sharks off the coast of North Carolina this summer, information security threats are lurking. And now that cloud computing is woven into the fabric [...]
Business And IT In today’s world, company operations function at two distinct levels: the business operation level and the IT infrastructure operation level. While the two functions operate independently, IT [...]
The Business of Security Security is one of those IT concerns that aren’t problematic until disaster strikes. It might be tomorrow, it could be next week or next year. The [...]