The conference call is a common business practice across the globe. But can conferencing usage help us learn about cultural trends?More >
Social media networks are actually the top phishing targets, followed by the financial industry. Their inherent interconnectedness makes them fruitful for criminals.More >
One of the most dangerous IT security threats of all time emerged recently -- a bug called Heartbleed. Here are eight tips for keeping your data safe.More >
Fred Cook, CEO of Chicago-based global PR firm GolinHarris, shares his PR insights on tech giants such as Steve Jobs and Oracle.More >
Regardless of the size of an enterprise or its industry, organizations must create and implement an incident response program to effectively and confidently respond to current and emerging cyber threats.More >
You need it. They claim to have it. What questions should you be asking as you hunt for the "just right" vendor to help you defend against the most sophisticated and determined adversaries?More >
VCE is proving that focusing on customers' unique needs can be the path to.... More >
If you are planning a BI investment in the near future, here are six common mistakes that you need to avoid to ensure your investment is an effective.... More >
The use of social engineering to distribute malware continues to account for the bulk of cyber attacks against consumers and enterprises, thereby.... More >
The excerpt from chapter three addresses issues that should be considered before you decide to outsource, including security and privacy impacts and secure communication via telephone, email, mobile and smartphones, instant messaging and traditional mail.
Responsibilities include participating in information technology risk assessments, IT audits, Sarbanes-Oxley compliance assessments, and IT consulting engagements.