Expect an Evolution in Ransomware in 2017

In 2017, ransomware will take the crown, because it is still an extremely effective method for gaining and maintaining access into corporate networks.

More >

More Collaboration Needed in Vendor Selection Process, Tech CEO Argues

Venkat Devraj, SelectHub CEO, argues that the issue isn’t that one CRM package is good, and another is bad. At issue is the need for the organization to look at technology purchases more holistically, and in a way that’s much more collaborative.

More >

IBM Makes Watson Analytics Available via Mobile iOS App

The new Watson Analytics Mobile App allows end users to query a cloud service consisting of an IBM analytics application imbued with Watson cognitive computing functions.

More >

The Linux Foundation Advances Open SDS Efforts

The level of interoperability between software-defined storage (SDS) systems should increase substantially in 2017.

More >

Looking Ahead to 2017: The Year Everything Changes

In 2017, we will see massive changes in transportation, government, cyber warfare and other areas we aren’t remotely ready for.

More >

Dell EMC CTO Envisions Rise of Smarter Hybrid Cloud Apps

Trey Layton, CTO of Dell EMC’s Converged Platforms & Solutions Division, says as cloud computing matures, the relationship between public clouds and private clouds running in local data centers will be far more nuanced.

More >
IT Downloads

Compliance2 Building a GRC Program: Assessing Stakeholder Needs and Readiness

This table outlines the top needs of each stakeholder group that can help guide your conversations on priorities and needs for the GRC program.

Learn more >

Security95 Guide to Cyber Threat Information Sharing

This publication provides guidelines for establishing and participating in cyber threat information sharing relationships.

Learn more >

DataCtr5 Colocation Checklist

This checklist will help make sure you ask the important questions that will affect your colocation services and your eventual purchase decisions.

Learn more >

email9 Trustworthy Email

This document provides recommendations and guidelines for enhancing trust in email, including transmission and content security recommendations.

Learn more >

IT_Man77 Job Description: Technology Project Manager

Whether you're looking to hire one or looking for a position yourself, use this detailed job description to find out what the role of a Technology Project Manager entails.

Learn more >

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.