dcsimg

Most Recent Governance And Risk

U.S. Utility Attacked Through Internet Accessibility

May 22, 2014 |

The control system of a U.S. utility was accessed through a remote access feature and brute-force tactics applied to the password authorization mechanism.

READ MORE

Spearphishing Quiz Quickly Demonstrates Danger

May 15, 2014 |

Even RSA participants didn't do all that well on McAfee's spearphishing quiz. Can your users do better?

READ MORE

Gartner to Increase Legal IT Research

April 24, 2014 |

Enterprise research firm Gartner intends to address what it calls an underserved marketplace.

READ MORE

Huntsville’s Exemplar City Model Aimed at Municipal Cybersecurity

April 17, 2014 |

Huntsville’s efforts in disaster planning will be shared with municipal governments across the U.S. through a model called Exemplar City.

READ MORE

Mobile Employees Frustrated with Collaboration Roadblocks

April 08, 2014 |

Addressing the problems that employees have trying to work collaboratively as they move around their own office space gives IT opportunities to demonstrate the right priorities.

READ MORE

Quarter of U.S. CIOs Report Having No Mobile Strategy in Place

April 01, 2014 |

Information is being delivered and consumed on mobile platforms and devices, but is there any strategy behind it? Not always.

READ MORE

NewsletterITBUSINESSEDGE DAILY NEWSLETTER

SUBSCRIBE TO OUR DAILY EDGE NEWSLETTERS

Catalog Sprawl Stings IT Departments Trying to Do It All

March 18, 2014 |

Too many user-facing front-end tools for IT to manage efficiently and effectively creates catalog sprawl. It's a self-inflicted wound for IT.

READ MORE

Windows XP Crunch Time Cause for Worry

March 10, 2014 |

Recently, arguments against Microsoft’s move to try to force users off the aging XP by ending support and patching on April 8 have been dissecting the potentially negative consequences more fully.

READ MORE

Ovum: Telecoms Starting to Embrace Big Trust

February 26, 2014 |

The long-term potential for cementing customer loyalty makes a shift in attitude about who owns and has access to data compelling to telecom.

READ MORE

Turning 'Shadow IT' into 'Running the Business'

February 21, 2014 |

Rather than a loss of control, the change can be one that creates a different approach to control and uncover ways for IT to be seen as a prominent enabler of the business as a whole.

READ MORE