All Slideshows | Page 2

    baselinemag.com

    How ROI Analysis Supports a Smooth Cloud Migration

    The majority of organizations are now conducting a formal ROI assessment before migrating to the cloud, according to a recent survey from Unisys. The resulting "2017 Unisys State of Cloud Transformation Survey" report ind...read more
    baselinemag.com

    Best Security Approach: Layers and Trained Staff

    A new report, the "2017 Global Threat Intelligence Report" from NTT Communications, calls for organizations to acknowledge people as a key part of any security program. That includes hiring and retaining skilled security professionals and using tec...read more
    baselinemag.com

    Many Companies Don't Use DMARC to Fight Phishing

    The vast majority of Fortune 500 companies are "woefully unprotected against phishing," according to a new research report, "Agari Global DMARC Adoption Report: Open Season for Phishers." Those organizations and their customers remain vulnerable t...read more
    baselinemag.com

    Why Some Companies Are Replacing Their CIO

    General dissatisfaction with tech leadership and IT support—as well as significant changes in company direction—are the most likely reasons that an organization will look to change its CIO, according to a recent survey from Delo...read more
    baselinemag.com

    How Pioneering Companies Are Using AI

    While a majority of organizations recognize the urgent need to deploy artificial intelligence (AI) technologies, relatively few are adopting AI beyond pilot programs, according to a recent survey from the MIT Sloan Management Review and the B...read more
    baselinemag.com

    Web Apps Are the Most Vulnerable to Breaches

    Is the cloud more—or less—secure than on-premises data centers? The "2017 Cloud Security Report," a study from Alert Logic, found 51 percent more security incidents per customer in on-premises installations than in public clouds. However, ...read more
    baselinemag.com

    Information Governance Is Poor at Many Companies

    Information governance is inadequate at the majority of companies, and more than one-third do not offer IG training, said a new survey. Furthermore, data lost due to staff negligence or bad practices plague companies, many of which cannot find rec...read more
    baselinemag.com

    How to Make a Business Case for Hiring a CDO

    With business stakeholders increasingly demanding quick access to data, the vast majority of CIOs are convinced that their organization needs to hire a chief data officer (CDO), according to a recent survey from Experian Data Q...read more
    baselinemag.com

    How Citizen Developers Are Driving Business Apps

    With demand for custom apps soaring, the presence of citizen developers is expected to grow over the next two years, according to a recent survey from FileMaker. The accompanying report, "Custom Apps: The Engine for Digital Tran...read more
    baselinemag.com

    CIOs Grow Frustrated With Hiring Delays

    A notable share of CIOs said the hiring process is taking too long, according to a recent survey from Robert Half Technology. In fact, it typically takes well over a month—and sometimes up to three months—to bring a candidate on bo...read more
    baselinemag.com

    Technologies and Sectors Most Vulnerable to Hacks

    Web developers reported that the government and financial services are the two sectors that are most vulnerable to hacking, and that smartphone home IoT is the most vulnerable technology. The survey was conducted for web applications security pro...read more
    baselinemag.com

    Domain Name System Is a Target for Hackers

    The mission-critical Domain Name System (DNS) is increasingly a target of more creative cyber- attacks designed to cause downtime or damage, according to a new study. Attackers use the DNS to exfiltrate data or launch distributed-denial-of-service attac...read more
    baselinemag.com

    Most Databases in the Cloud Are Not Encrypted

    The majority of databases in the public cloud are not encrypted, exposing sensitive personally identifiable information (PII) and protected health information (PHI), according to a new survey. The report, "Cloud Infrastructure Security Trends," revie...read more
    baselinemag.com

    How Mobility Is Driving the Digital Transformation

    The internet of things (IoT), artificial intelligence (AI) and other emerging technologies dominate headlines today, but CIOs and their IT teams aren't neglecting mobility either. In fact, the vast majority consider mobility a...read more
    baselinemag.com

    Ex-Employees Still Cause Data Breaches

    Many ex-employees continue to have access to corporate applications and often contribute to data breaches, says a new study. Forty-eight percent of respondents in the study, "Curse of the Ex-Employees," are aware of the problem. Furthermore, 20 percent of r...read more
    baselinemag.com

    How a Blended Approach to Databases Can Help IT

    With many current systems failing to make data available in a timely manner, a significant share of companies are actively evaluating new forms of database management system (DBMS) technology, according to a recent survey from Int...read more
    baselinemag.com

    Digital Innovation Improves Customer Experiences

    The vast majority of CIOs and other tech leaders said that they feel under pressure to constantly improve their organization's customer experience (CX) through digital innovation, according to a recent survey from Couchbase. Fortun...read more
    baselinemag.com

    Benefits and Challenges of Intelligent Automation

    Business leaders worldwide believe the success of their enterprise depends on successfully deploying intelligent automation (IA) during the next five years, according to a report from Avanade. However, while the majority of business leaders ...read more
    baselinemag.com

    Why Some Business Execs Think IT Can Be Replaced

    As company culture and existing "organizational context" (attributes in the environment that can influence performance) keep CIOs from being as effective as they could be, many business executives said that IT is either sig...read more
    baselinemag.com

    Why Employees Hide Cyber-Security Incidents

    Workers are hiding cyber-security incidents from their employers, according to a new study, thereby increasing overall damage. The consequences can be dire. Just one unreported incident may indicate a much larger breach, and security teams must be able...read more
<1234567> Last
(Page 2 of 109)