In the age of digital transformation, improving the “security playbook” is necessary in order to avoid the C-suite level executive’s two worst nightmares: corporate financial data theft and customer information theft.More >
We should expect more phishing attacks like this, or at least increasingly sophisticated and more difficult to detect.More >
Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017.More >
The key to making an impact as an IT leader is to come to the table as a business leader who happens to be running the technology team, rather than purely as a technologist waiting to receive requirements to fulfill.More >
Even as the enterprise industry migrates to the cloud, it might be beneficial to examine some of the downsides to the hyperscale trend, particularly the consequences of consolidating resources onto a relatively finite number of physical data centers around the world.More >
Shadow IT can only remain in the shadows if IT allows it. Providing greater autonomy to users, developers, business units and tech admins will produce a more dynamic, flexible approach to workflow management. More >
Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with.... More >
The Intel Atom processor E3900 series employs 14-nanometer silicon to push processing horsepower out to the very edge of distributed IoT.... More >
Digital innovation is by far the biggest influencer, changing the way we do just about everything, from shopping to communication to running a.... More >
This table outlines the top needs of each stakeholder group that can help guide your conversations on priorities and needs for the GRC program.
This publication provides guidelines for establishing and participating in cyber threat information sharing relationships.
This checklist will help make sure you ask the important questions that will affect your colocation services and your eventual purchase decisions.
This document provides recommendations and guidelines for enhancing trust in email, including transmission and content security recommendations.
Whether you're looking to hire one or looking for a position yourself, use this detailed job description to find out what the role of a Technology Project Manager entails.