Blog Posts Tagged with "Information Technology"
March 14, 2011 Added by:Bill Gerneglia
Network administration specialists were expected to be in most demand. These were cited at possible tough hires by 65 percent of CIOs. Windows Server administrators were next, at 60 percent, followed by desktop support at 57 percent and database management at 52 percent...
March 13, 2011 Added by:Don Eijndhoven
Cyber Warfare is a fringe area. Information Security is poorly understood by the mainstream populace, a fact well evidenced by the digital exhibitionism taking place on the various social networking sites. In fact, it is even poorly understood within the IT sector itself...
March 04, 2011 Added by:Rahul Neel Mani
New technologies are emerging at lightning pace. Economic pressures are bogging down strategic planning. Demand on IT is escalating to untenable levels. Sounds daunting? CIOs had better buckle up, because these are some of the challenges AmerisourceBergen CIO Tom Murphy sees on the horizon for 2011...
February 12, 2011 Added by:Ben Kepes
As the cloud computing trends continue to inundate the IT market, organizations must seek ways to ensure capacity required to run business critical applications. During the shift to the cloud, capacity must be available and current infrastructure needs to maintain a strong hold on efficiency...
February 12, 2011 Added by:Christophe Veltsos
Who said: "If you think buying anything, whether physical or metaphysical, can completely relieve you of fear, uncertainty, and doubt, you are naïve. People don’t work that way, and we shouldn’t. Fear, uncertainty, and doubt, at reasonable levels, keep us alive, and alert..."?
February 10, 2011 Added by:Robert Gezelter
The societal landscape has been altered by pervasive connectivity and the availability of information. Our practices must be revised to reflect this new landscape. The pervasiveness of wireless communications has reached the threshold where the integrity of jury trials is at risk...
February 05, 2011 Added by:Rahul Neel Mani
Organizations look at it as I have to protect my data either for importance or compliance reasons, maintain it and have it totally secure. Whether it be the aspect of authorization, authentication, or encryption of the data, information management security becomes a key component...
January 22, 2011 Added by:Javvad Malik
You walk back to the office knowing full well, like hundreds of others in their office, they’ve forgotten their password. You then have to jump through 20 different hoops to identify yourself. Your name, ID number, user ID, your managers name, your national insurance number… blah blah blah... Finally, you’re told that your password has been reset to Password123. Success? Nearly, becaus...
January 20, 2011 Added by:Robert Siciliano
Researchers discovered they could hack into Internet-ready HDTV’s. One of the top five best-selling TVs left its security process vulnerable to attack, allowing a hacker to compromise the data transmitted between the TV and websites that provide content...
January 17, 2011 Added by:Dr. Steve Belovich
There are no quick fixes to this growing problem. One thing, however, is almost certain: The growing body of lawsuits on identity theft, medical record theft, software security, safety and reliability issues will lead to federal and/or state regulation...
January 14, 2011 Added by:Rahul Neel Mani
As his responsibilities changed, from long-time CIO at HP to Royal Dutch Shell’s first CIO-from-outside to an EVP with Juniper, Mike Rose found the best way to get the job done is not to preach technology or business. He saw his role as helping people find that middle ground...
January 12, 2011 Added by:Mike Meikle
According to a December 2010 Dice report, IT hiring will enjoy a 10% to 20% bump. This will be focused in a few key areas, Development, Infrastructure and Project Management. This data corroborated by a recently released Technisource’s IT HIRE Intelligence survey...
December 30, 2010 Added by:Christopher Burgess
When the IT pros show up at your desk asking you to identify, forecast or project your needs, work with them. They are attempting to get ahead of your requirements. You see, in the end, it all boils down to you, your data, and the data center supporting you...
December 22, 2010 Added by:Allan Pratt, MBA
The bottom line is that we, as information security professionals, must speak with other business units in their own languages in order to explain the threats we deal with on a daily basis. Business units need to understand how their work can, and will, be affected when breaches happen...
December 05, 2010 Added by:Theresa Payton
Consumers are becoming more aware of cookies and internet mailing lists and have been taking steps to protect themselves from being profiled by advertisers. A way around user controls is to use a technology known as device fingerprinting...
December 04, 2010 Added by:Rahul Neel Mani
Michael Sentonas is Vice President and CTO Asia Pacific at McAfee Inc. In an interaction with R Giridhar at the recent McAfee Focus 10 event, discusses the evolving security landscape and the new approaches to security...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013