IT's naughty list requires reams of paper now as the vast majority of workers are now found quilty of some sort of acceptable use transgression at work.
Chief information officers and enterprise IT departments face a myriad of challenges when allowing employees to bring their own mobile devices into the work environment. Issues related to management, support, security and access control abound.
Avoiding all risk is natural, and stupid.
You may have a sound understanding of the risks your organization faces, but do you know how willing the organization is to tolerate those risks? Assessing risk tolerance comes down to three simple steps, advises Craig Shumard, principal at Shumard and Associates and former CIO of CIGNA.
It's natural for companies to want to make use of the latest hot technology, but that doesn't mean just any emerging technology is right for your company--even if it is already being adopted by your competitors. And one useful lens for evaluating proposed innovation is risk, says TradeMonster CTO Sanjib Sahoo in Wall Street & Technology.
While the risk of a pandemic does not appear inevitable yet, the mounting number of swine flu cases discovered around the world is understandably worrisome. Having lived through the SARS outbreak in
The information the IRS gets and keeps is sensitive for every taxpayer. That's why it's so worrying when the Inspector General announces that wireless deployments and policies make wireless
A survey sponsored by Cisco and conducted by InsightExpress has found that poor judgment and bad practices by users are defeating the intent of security hardware and software, leaving enterprise
It's been heralded as a future risk, but actual malware has begun hitting the mobile user environment, especially in Japan and Europe. There's still plenty of time to put some security in place
The recent events in which the U.K. and several other countries collaborated to thwart what could have been a massive in-flight terrorist attack changed travel overnight, especially for the