Bluebox2015MobileSecurity290

Mobile Security 2015: The Enterprise at Risk

While hackers have many points of entry – point-of-sale devices, phishing emails, malware, etc. - the long reach of mobile to mission-critical apps and data has exponentially increased the potential for a breach.

More >
DataM18-290x195.jpg

Round-Up: 2015’s Top Integration Trend, In One Word

The demand for agility, collaboration and better data-flow governance will lead to companies upgrading their B2B integration tools.

More >
mobile48-290x195

The Eighteen Best Android Apps of 2014

With the end of the year fast approaching, the staff at Google Play has made their picks for the best Android apps of 2014.

More >
cloud13-290x195.jpg

The Cloud and the Enterprise: Which Needs the Other More?

We’ve seen a subtle shift in attitude: It’s not the enterprise that needs to adapt to the cloud, but the cloud that needs to adapt to the enterprise.

More >
email2-290x195

Nine Email Scandals that Underscore the Need for Proper Archiving

Being able to easily access archived documents, emails and messages takes the guesswork out of certain situations and will ultimately protect your company if used correctly.

More >
Risk5-290x195

Major Trends Shaping Governance, Risk Management, and Compliance in...

Our world is increasingly risky, regulated, mobile, social, global, cloudy, interconnected and data-driven. All of this, taken together, has significantly and fundamentally changed the way individuals live and work, and the way organizations conduct business.

More >
IT Downloads

Security44 Assessing Security and Privacy Controls in Federal Information Systems and Organizations

This publication provides a set of procedures for conducting assessments of security controls and privacy controls employed within federal information systems and organizations.

Learn more >

Security10 Job Description: Cybersecurity Program Manager

The cybersecurity program manager will support the execution of product cybersecurity elements across global programs and services.

Learn more >

Mobile41 Challenges and Benefits of a Methodology for Scoring Web Content Accessibility Guidelines (WCAG) 2.0 Conformance

This paper explores a methodology to score adherence of a web page to WCAG 2.0 conformance requirements.

Learn more >

Time4 The Time Bandit Solution: Recovering Stolen Time You Never Knew You Had

This excerpt from chapters 1:00 and 1:30 focuses on the causes and manifestations of time lost as a result of unwanted, unnecessary and wasteful interruptions, and provides a calculator to measure how much of your time is wasted by interruption time-loss factors.

Learn more >

IT_Man31 Microsoft SharePoint 2013 Cheat Sheet

This SharePoint 2013 Cheat Sheet covers program fundamentals, as well as tips on managing documents, accessing wikis and blogs, and task management.

Learn more >

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date