While Internet of Things is all abuzz nowadays in enterprises circles, there are some important obstacles to true IoT enterprise utilization, explained Kevin Curran, a professor of computer science at the University of Ulster and IEEE senior members.
The top news stories for Feb. 27, 2015.
A new study reveals that a lack of resources and a critical disconnect between CISOs and senior corporate leadership are preventing many organizations from properly addressing growing cybersecurity threats.
The top news stories for Feb. 25, 2015.
More than anything else, issues related to IT security are what keep CIOs up at night. But adding to the anxiety my be concerns that many CIOs themselves are not doing enough to put up a best defense.
The top news stories for Feb. 24, 2015.
While many enterprises see BYOD programs as a money saver, to be successful, a mobility program, whether BYOD or corporate-owned, needs substantial capital investment, argued tech writer Kapila Gidwani in a CloudTweaks article.
A 14-year-old successfully demonstrated how cars can be hacked thereby illuminating both a new source of data that can be secretly gathered by any number of private and public big data practitioners, and a new cybersecurity worry.
The top news stories for Feb. 18, 2015.
While BYOD continues to be a security thorn in the side of enterprises, there are steps IT can take to reduce the risks. Here are three strategies that IT can use to secure BYOD devices and apps.