A new report aggregates and standardizes cyber crime data from the first six months of the year into cyber BI that provides some interesting insights.More >
The latest version of the Huddle platform essentially leverages the company’s cloud collaboration service to create a secure publishing platform.More >
While it may seem the kids are loading up on the cool toys, never fear. Many of these gadgets and gizmos are equally fun and intriguing for the adults.More >
With increased popularity comes more attention from malicious hackers trying to access PII and other sensitive data. It's more critical than ever before to understand how -- and where -- you're storing your data, and the variety of vulnerabilities that can exist in the apps in your network.More >
The server market is breaking out and now a pitched battle between IBM and Intel could mean the end of SPARC and Itanium.More >
Tired of missing deadlines, losing notes, or running late for meetings? It's time to put the power of mobile to work for you, especially for your peace of mind.More >
From lighting to keyboards to USB hubs, many of these gadgets not only add individual flare but aid in.... More >
Analytics is the one weapon you need to have working for you to keep your customers from looking for greener pastures with your.... More >
Effective critical thinking has been identified as one of the key skills required for future success by educators, business leaders and.... More >
The data scientist drives initiatives to improve website monetization and user experience, while delivering analytics to better understand user engagement.
In this excerpt from chapter 20, the author briefly discusses the challenges and success factors that the organization must be aware of to maintain compliance and achieve optimum information security for the enterprise.
The excerpt from chapter 2 focuses on building the best possible team to perform the strategic initiative the organization has identified as a worthy opportunity.
The Director of Corporate IT is expected to establish and maintain company-wide security and compliance policies, and set the vision and strategy for enabling a highly efficient workforce.
The excerpt from chapter 8 focuses on how to rebuild trust with the seven steps for healing, which are intended to serve as a framework to help readers work through the painful feelings of betrayal toward renewal.