When the Firewall Is Not Enough

In the era of the Internet of things, CIOs must apply the same security policies to printers as they do to their IT infrastructure. Statistics of printer breaches are unavailable, but HP estimates that 70 percent of customers do not secure their printers. Man-in-the-middle attacks abound. As an example, university students recently re-routed a professor's tests, printed them in a dorm room,... Read More »

Unstructured Data, Unending Security Concerns

Eighty percent of respondents to a new survey know of data leakage incidents in their organizations, and while most have implemented technical controls and auditing, only 16% are highly confident in their file security investments. Consequently, there is a gap between file security policies and the efficacy of technical controls, including encryption, to monitor and enforce compliance. David... Read More »

Transforming Various Data Sources Into One Platform

Conair’s CIO has forged a strong partnership with marketing and sales to enable easier and faster analytics of customer preferences to drive sales.

Read More »

11 Ways to Protect Data in the Cloud

The recent avalanche of security breaches is forcing CIOs to establish new due diligence priorities to protect business data in the cloud. This is an especially timely issue, given the FTC's recent ruling, which Read More »

Using Neuroscience to Realize Big Data’s Value

How organizations can recoup 60 to 80 percent of their massive investment in big data.

Read More »

Managing Cloud Costs (and Expectations)

Today, cloud computing growth outpaces all other IT spending, according to IDCRead More »

Demand for Apps Grows but Quality Takes a Hit

Tech departments are allocating a significantly larger share of their overall budgets to quality assurance (QA) and testing, according to a recent survey from Capgemini. Produced in conjunction with HP, the resulting "Read More »

When Disaster Recovery Plans Are a Disaster

Only a minority of organizations are able to activate their disaster recovery/business continuity (DR/BC) plans with minimal difficulties, according to a recent survey from Janco Associates. In some cases, DR/BC teams don't have the training required to carry out the plan. In others, they fail to properly document their... Read More »

When State IT Is Handed Over to the Private Sector

The COO of the Georgia Technology Authority drives substantial value through privatizing infrastructure and managed network services.

Read More »

How Midsize Companies Put Large Companies at Risk

Although medium and large businesses are exposed to the same types of threats, they react differently to them, according to a new study. Bitdefender, in partnership with Millward Brown, surveyed 300 CIOs at companies within this size range. They found that 46 percent of large business... Read More »

Read More From Our IT Strategy Archive »
Thanks for your registration, follow us on our social networks to keep up-to-date