All Slideshows | Page 6

    baselinemag.com

    Security and Privacy Concerns Dog the Cloud

    Security and privacy of data and systems in the cloud remain a top worry for the majority of IT professionals worldwide, according to a new survey. Furthermore, unauthorized access, malware and DoS attacks are the top three cloud security concerns toda...read more
    baselinemag.com

    Dealing With Unacceptable Excuses for Being Late

    Maybe the whole flex-work thing hasn't caught on after all. The majority of CIOs and other executives expect staffers to show up on the job on time every day, according to a recent survey from CareerBuilder. A significant number of ...read more
    baselinemag.com

    How to Speed Up Software Release Rates

    CIOs and other IT decision-makers are committed to increasing the frequency of software releases. However, boosting the rate of these releases often leads to eventual failures, according to a recent survey from Appvance. The resulting rep...read more
    baselinemag.com

    Companies Are Ill-Prepared for Cyber-Attacks

    A recent survey reveals that most organizations are not prepared for outsider attacks, data vulnerability, insider sabotage, user errors and phishing. It also explores security concerns when migrating to the cloud and reports that IT-decision-makers f...read more
    baselinemag.com

    10 Ways to Harness the Power of Data Analytics

    The digital universe—which incorporates the data we create, copy, distribute and store—is growing approximately 40 percent a year, and that growth rate is expected to continue into the next decade, as the internet of things (...read more
    baselinemag.com

    How Citizen Developers Improve App Delivery

    The most valuable developers of custom apps for your organization may not even work in the IT department. That's because the growing presence of employees and managers called "citizen developers" are creating custom apps in a very efficien...read more
    baselinemag.com

    How to Protect Your Business Against Cyber-Threats

    With well-funded hackers becoming even more technically astute, long-trusted cyber-security methods are no longer enough to protect an organization's intellectual property, business data, and private employee and customer information. Hackers ca...read more
    baselinemag.com

    11 Cyber-Security Predictions for 2017

    A new forecast predicts that automated malware attacks will have a devastating effect on the internet of things (IoT). It also predicts the rise of the Shadownet (IoT botnets that can't be seen or measured using conventional tools), cloud poisoning, more gr...read more
    baselinemag.com

    Why Businesses Are Investing in Content Analytics

    Content analytics is expected to be essential within five years, even though most organizations are just beginning to explore this developing technology, according to a recent survey from the Association for Information and Image Mana...read more
    baselinemag.com

    Disaster Recovery Plans and Testing Are Lacking

    Only 60 percent of the organizations surveyed have a documented disaster recovery plan in place, and just 40 percent of them test the plan annually, according to a new survey. Moreover, the majority of companies are dissatisfied w...read more
    baselinemag.com

    Why IT Security Will Remain a Top Priority in 2017

    A significant number of CIOs, along with other C-suite executives and managers, reported that their technology budget will see major increases this year, according to a recent survey from Mondo. The accompanying "2017 Tech Trends and Talent" rep...read more
    baselinemag.com

    Citizen Development Is Spreading Rapidly

    So-called "citizen developers" are increasingly building custom business applications without code, giving employees better access to data and leading to faster decision making, according to a new report. The study, "2016 State of Citiz...read more
    baselinemag.com

    Digital Transformation Is About More Than Tech

    While the completion of a digital transformation has emerged as a top strategic priority for many organizations, continuing dependencies on legacy technologies create barriers to such efforts, according to a recent survey from Forbes Insights a...read more
    baselinemag.com

    The Disconnect Between Breaches and Solutions

    The average company suffers two or three security breaches a month, a new survey reveals, and yet a majority of security executives said they are confident in their ability to protect their enterprises from cyber-attacks. The report, "Building Confid...read more
    baselinemag.com

    How to Optimize Business Intelligence

    Some organizations are reaping returns from their investments in business intelligence (BI), but less than half of them feel they are getting the full benefit of such programs, according to a recent report from Forbes Insights. These executives r...read more
    baselinemag.com

    IT Jobs and Salaries Will Increase in 2017

    U.S. CIOs and other tech executives are feeling optimistic about prospects for IT jobs and salary growth in 2017, according to a recent survey from Janco Associates. Thousands of domestic technology jobs are expected to be added every month, f...read more
    baselinemag.com

    10 Ways to Deal With Hacktivist Attacks

    Hacktivist attacks affect everyone. You don't have to be a high-profile oil or pharmaceutical company to suffer from one. Just combining personal and work activities while online, posting too much information to social media or otherwise attracting unwante...read more
    baselinemag.com

    How Decentralized IT Can Lead to Chaos

    The ongoing decentralization of IT management—fueled by increasingly empowered business departments that are taking ownership of some tech areas—is putting a strain on CIOs and their teams, according to a recent survey from VMware. The resu...read more
    baselinemag.com

    10 Reasons Why Social Media Compliance Matters

    Companies are challenged every day to figure out how to balance the risks versus rewards in allowing social media communications and permitting the use of personal networks to promote the business. Preapproval of social communications can mitigate r...read more
    baselinemag.com

    Poor Password Habits Can Endanger Business

    Although most individuals know what safe passwords should be, most people tend to ignore what they know and instead use easy-to-remember passwords because their fear of forgetting is stronger than their fear of being hacked, according to a recent study ...read more
<1234567891011> Last
(Page 6 of 107)