Latest Headlines

Latest Headlines

News Scan: Mobile, social, cloud tech boosting security spending; NASCIO names 33 finalists for top IT initiatives; more

The top news stories for August 22, 2014.

News Scan: NSA spying fallout worse than first thought; Consumers await word on Supervalu breach severity; more.

The top news stories for August 20, 2014.

Privileged access a security officer's worst nightmare

It is literally impossible to prevent a security breach with 100 percent certainty, writes IT security expert Dimitri Vlachos. But a good defense starts with examining your privileged access policies.

Cyber-attack disclosures rarely offer actionable information

Despite increased public pressure and government legislation on organizations to report IT security incidents, those disclosures rarely include differentiated of actionable information, a new study finds.

Lack of adequate control system security is 'shocking' and 'insane'

The lack of adequate security for industrial control systems is "shocking" and "insane," asserts Stefan Luders, computer security officer at European scientific research center CERN.

BYOD benefits: Industry experts weigh in

While BYOD conjures up security nightmares for IT departments, it can have significant benefits for enterprises, such as increased employee satisfaction and productivity, as well as reduced training and hardware costs.

Studies confirm epidemic of cyberattacks

A majority of companies experienced some sort of external cybersecurity incident in the past year, and cybersecurity breaches are now driving organizational strategy for most of them.

Proliferation of BYOD devices prompts Wi-Fi network upgrade at University of Miami

The explosion of BYOD devices on the network and the need for greater mobile network density prompted the University of Miami to make a major upgrade to their Wi-Fi network.

10 steps to enterprise mobility mastery

It's no secret that the mobile market is transforming the enterprise. Here are 10 things that CIOs need to know to master enterprise mobility.

IT pros unsure about virtualization security

The need for security in virtual environments escapes many IT pros, yet a majority understand the importance of virtualization to their IT infrastructure.