In the past year, we have witnessed cyber attacks of unprecedented sophistication and reach. These attacks demonstrate that malicious actors have the ability to compromise and control millions of computers that belong to governments, private enterprises and ordinary citizens. If we are going to prevent motivated adversaries from attacking our systems, stealing our data and harming our critical infrastructure, the broader community of security researchers — including academia, the private sector and government — must work together to understand emerging threats and to develop proactive security solutions to safeguard the Internet and physical infrastructure that relies on it.
Ten Apple Apps for BusinessApple apps to help increase business productivity.
Top Eight Features in Windows Server 8 Windows Server 8 is a technically sophisticated operating system that is crammed with features that bring many previously enterprise-only capabilities to small and mid-sized businesses.
Seven Points CIOs Must Know About the Board of Directors Seven areas that CIOs must understand and act upon in order to effectively work with the board.
Gartner has identified four dominant futures for IT in the organization. They are not mutually exclusive and may exist in combination. ... More >>
Potentially disruptive technologies for drug delivery, low-cost solar, cheaper LEDs, and efficient grid storage highlight Lux Research’s Q3 list ... More >>
From selling the project to maintaining a timeline to ensuring third-party vendors are on the same page, there’s a lot of pain in replatforming. ... More >>