Latest Headlines

Latest Headlines

To utilize IoT, enterprises need to overcome these obstacles

While Internet of Things is all abuzz nowadays in enterprises circles, there are some important obstacles to true IoT enterprise utilization, explained Kevin Curran, a professor of computer science at the University of Ulster and IEEE senior members.

News Scan: Net neutrality becomes official; IT Budgets rising by 6%; More

The top news stories for Feb. 27, 2015.  

Cybersecurity most hindered by lack of resources, communication disconnect

A new study reveals that a lack of resources and a critical disconnect between CISOs and senior corporate leadership are preventing many organizations from properly addressing growing cybersecurity threats.

News Scan: Sony breach was a security game changer; CIO does still mean 'career is over'; More

The top news stories for Feb. 25, 2015.

Security worries are a nightmare for CIOs

More than anything else, issues related to IT security are what keep CIOs up at night. But adding to the anxiety my be concerns that many CIOs themselves are not doing enough to put up a best defense.

News Scan: Data explosion and opportunity; High price of malware threats; More

The top news stories for Feb. 24, 2015.

Enterprise mobility requires capital investment to be successful

While many enterprises see BYOD programs as a money saver, to be successful, a mobility program, whether BYOD or corporate-owned, needs substantial capital investment, argued tech writer Kapila Gidwani in a  CloudTweaks  article.

14-year-old hacks cars; Vehicle data is subject to tracking, cyberattacks

A 14-year-old successfully demonstrated how cars can be hacked thereby illuminating both a new source of data that can be secretly gathered by any number of private and public big data practitioners, and a new cybersecurity worry. 

News Scan: Most malware escapes antivirus protection; Play nice with your CMO, already; More

The top news stories for Feb. 18, 2015.

3 strategies to lessen BYOD security risks

While BYOD continues to be a security thorn in the side of enterprises, there are steps IT can take to reduce the risks. Here are three strategies that IT can use to secure BYOD devices and apps.