1.800.219.7290 / Careers / About Us / Contact Us / Partner Login / Shop Online

Categories

Popular Tags

Archives

Our Authors

Subscribe

Despite stringent regulatory mandates, the healthcare industry has been an avid adopter of new technology. Mobility in particular has proven to be a boon for doctors and other hospital staff. For this reason, looking at IT implementations within healthcare organizations can serve as a good way to le...
Hits: 302
0

Posted by on in Virtualization
Cybercriminal tactics have evolved to not only become more efficient at stealing sensitive data, but better at hiding hacker activity while doing so. A recent white paper by research firm Frost & Sullivan discussed the risk of advanced cyber threats, noting that traditional information security ...
Hits: 181
0

Posted by on in Data Security
As 2012 draws to a close, many IT professionals are re-examining priorities and setting new goals. A recent InformationWeek survey found that tech decision makers ranked improving information security as their number one goal for the coming year. In response to the survey results, the publication of...
Hits: 147
0

Posted by on in Data Breach
This year was marked by a number of high-profile data breaches worldwide. While the U.S. experienced numerous incidents that shook the population's confidence in the ability of organizations to protect sensitive information, New Zealand companies and government agencies also came under fire for data...
Tagged in: Data Breach
Hits: 269
0

Posted by on in Cloud
A wide variety of cyber security issues have been echoing in the halls of Congress in recent months, but as of yet, no formal legislation has been passed. At the center of many of these discussions has been the complicated task of proactively pursuing digital threats to national security without vio...
Hits: 297
0