Regardless of the size of an enterprise or its industry, organizations must create and implement an incident response program to effectively and confidently respond to current and emerging cyber threats.More >
Global research shows 37 Percent of technology budgets now controlled outside of IT departments; 79 percent of C-level executives believe they can make better and faster decisions without the involvement of IT.More >
One of the most dangerous IT security threats of all time emerged recently -- a bug called Heartbleed. Here are eight tips for keeping your data safe.More >
VCE is proving that focusing on customers' unique needs can be the path to.... More >
If you are planning a BI investment in the near future, here are six common mistakes that you need to avoid to ensure your investment is an effective.... More >
The use of social engineering to distribute malware continues to account for the bulk of cyber attacks against consumers and enterprises, thereby.... More >
Responsibilities include participating in information technology risk assessments, IT audits, Sarbanes-Oxley compliance assessments, and IT consulting engagements.
This publication presents a methodology for assigning authentication strengths based on the strength of pair wise bindings between the five entities involved in smart card based authentications.
Like any meeting, a virtual meeting should be well planned and engaging for all those who attend. Unfortunately, most who take part in frequent virtual meetings don’t often find that is the case.