Huntsville’s efforts in disaster planning will be shared with municipal governments across the U.S. through a model called Exemplar City.More >
You need it. They claim to have it. What questions should you be asking as you hunt for the "just right" vendor to help you defend against the most sophisticated and determined adversaries?More >
It’s a simple but significant change to a process that vexes employees, managers and HR.More >
Big Data became the buzzword du jour to describe the vast collection of information that could be synthesized and used to help us make smarter decisions faster. But how do we profit from it?More >
VCE is proving that focusing on customers' unique needs can be the path to.... More >
If you are planning a BI investment in the near future, here are six common mistakes that you need to avoid to ensure your investment is an effective.... More >
The use of social engineering to distribute malware continues to account for the bulk of cyber attacks against consumers and enterprises, thereby.... More >
The excerpt from chapter three addresses issues that should be considered before you decide to outsource, including security and privacy impacts and secure communication via telephone, email, mobile and smartphones, instant messaging and traditional mail.
Responsibilities include participating in information technology risk assessments, IT audits, Sarbanes-Oxley compliance assessments, and IT consulting engagements.