Survey results found that only a small percentage of respondents are IPv6-ready and even fewer are offering IPv6 to their end users, due in large part to challenges operators face.More >
Michaels Arts and Crafts and Aaron Brothers stores admitted that stores suffered two different eight-month-long breaches.More >
Big Data became the buzzword du jour to describe the vast collection of information that could be synthesized and used to help us make smarter decisions faster. But how do we profit from it?More >
Rather than adopt a solution that only addresses one particular area of recovery, ensure your backup and recovery solution includes these features.More >
VCE is proving that focusing on customers' unique needs can be the path to.... More >
If you are planning a BI investment in the near future, here are six common mistakes that you need to avoid to ensure your investment is an effective.... More >
The use of social engineering to distribute malware continues to account for the bulk of cyber attacks against consumers and enterprises, thereby.... More >
The excerpt from chapter three addresses issues that should be considered before you decide to outsource, including security and privacy impacts and secure communication via telephone, email, mobile and smartphones, instant messaging and traditional mail.
Responsibilities include participating in information technology risk assessments, IT audits, Sarbanes-Oxley compliance assessments, and IT consulting engagements.