The cyber threat landscape has matured over the past 10 years, due in part to the proliferation of new technologies and an increasing reliance on the Internet for personal, business and governmental needs. Wielding their keyboards, cyber criminals exploit new and existing technologies for financial gain, to exact revenge or to carry out political coups. In their wake, they leave behind the tattered remains of unsuspecting individuals' life savings or companies' intellectual property, or the potential for disruption of national infrastructures.
Narus, Inc., a leader in real-time traffic intelligence for protecting governments, service providers and enterprises against cyber threats and the risks of doing business in cyber space, recently compiled a top 10 list of the latest cyber threat trends that will likely pop up over the next few years. Many on the list originated in the last decade, and have been fine-tuned to create more chaos in the years ahead.
Most IT programs struggle during the initiation phase since key program management activities are not completed to effectively start the program. This leads to longer startup times and missed budget targets, even before the program begins. ... More >>
Benefits realization management and its influence on project success is expected to expand the role of project portfolio management within enterprises. ... More >>
After fifty years working with a range of companies — as well as founding and running his own company, J.D. Power and Associates — Dave Power has observed a good deal, and come away with a few thoughts about how to have the best shot at success in business. ... More >>