A recent survey of 250 senior IT decision makers in the U.K. found that, although 84 percent claimed they were concerned or very concerned about IT security breaches, 55 percent have not tested the security systems and procedures of cloud vendors. The study, conducted by IT recruitment consultancy R...
Mobile application development is quickly evolving from pet project to business necessity within corporate IT departments. But whether it's constructing an enterprise app store that caters to the demands of digital native employees, or a slate of customer-facing convenience tools, companies must kee...
At this point, there is no shortage of cloud computing advocates highlighting the technology's commercial potential. But just as cost control and competitive differentiation are leading business priorities, so too is risk management. Most importantly, that means protecting sensitive data as it migra...
It may not be easy to go back and closely look at what went wrong following a data breach. No one wants to be the employee that lost a flash drive or failed to meet a compliance requirement. However, acting within an effective information security framework requires organizations to do exactly that ...
A wide variety of cyber security issues have been echoing in the halls of Congress in recent months, but as of yet, no formal legislation has been passed. At the center of many of these discussions has been the complicated task of proactively pursuing digital threats to national security without vio...