Blog Posts Tagged with "Information Technology"
September 01, 2011 Added by:Headlines
"...governments around the world are wasting billions of dollars on unnecessary information technology. This problem has worsened in recent years because of what I call the 'I.T. cartel.' This powerful group of private contractors encourages reliance on inefficient software and hardware..."
August 24, 2011 Added by:Emmett Jorgensen
Whether you are planning on selling, recycling or throwing away your old hard drives, you should always consider using one of these solutions: destruction, degaussing, or secure data erasure. Otherwise, there's no telling whose hands you data may end up in...
August 23, 2011 Added by:Headlines
The National Institute of Standards and Technology (NIST) is hosting a workshop on Cryptography for Emerging Technologies and Applications that is intended to identify the cryptographic requirements for emerging technologies and applications...
August 20, 2011 Added by:Bill Gerneglia
According to the first-half 2011 IT salary survey from Janco Associates, IT compensation has increased slightly. While overall employment remains lackluster by most organizations across all industries, there is comfort in the fact that more tech jobs are being added than are being cut...
August 16, 2011 Added by:Ben Kepes
The Catch 22 situation – IT cannot free up sufficient dollars to move legacy applications to the Cloud. And because they therefore have to focus a significant proportion of their budget on keeping the lights on, the opportunities for investment in these activities are eroded...
August 09, 2011 Added by:Bill Gerneglia
In many cases they lack the proper staff and dedicated resources to properly battle the daily IT disruptions. They are at times responsible for technology budgets, servers, applications, and IT staff that are outside their control - this leads to stress and often sleep deprivation...
August 08, 2011 Added by:Jason Remillard
The lines between ‘Internet’ and ‘Enterprise’ are blurry, but I am still amazed at the rapid speed of which this is occurring and the velocity of not just change, but the impact of this change on solutions and integrations for standard equations of IT such as Security...
August 02, 2011 Added by:Bill Gerneglia
Without central control of purchases, there is no homogeneous IT solution provider across the organization. This leads to inconsistent service, lack of collective purchasing discounts available at higher user volumes, and lack of standard IT policies, making for an IT management nightmare...
July 22, 2011 Added by:Bill Gerneglia
A few years ago when a CIOs responsibilities consisted of running the IT shop efficiently, it was difficult to make the case that they belonged in the top managerial tier or deserved a seat at the executive conference table. That was then. Today CIOs’ responsibilities have grown significantly...
June 15, 2011 Added by:Rahul Neel Mani
CIOs often don’t want to come out of their IT shell. Rather than thinking business, they get immersed into IT. Although a lot of CIOs do have those skills, but they don’t move away from IT. You need a lot of guts to get to the CEO’s position, it’s a totally different ballgame...
June 15, 2011 Added by:Jonathan Lampe
If your IT department intersects with the finance, health care, government or energy sectors, or is subject to regulations such as PCI-DSS, then you should be using FIPS 140-2 validated cryptography now to protect data-in-transit and data-at-rest...
June 08, 2011 Added by:Rafal Los
Over time the term has become widely over-used to the point where meaning is largely lost, and sadly most people on the buyer side of the aisle think it's just some marketing term or a way to get them to buy more of whatever widget is being sold...
June 08, 2011 Added by:Danny Lieberman
We all use the term ”IT Governance” as if security of data was dependent on policy. Since we have lots of IT governance and lots of data breaches, we may safely assume that writing procedures while the hackers attack software and steal data is not an effective security countermeasure...
June 01, 2011 Added by:Robb Reck
Information security works differently than IT. Rather than focusing on how to build a system that can meet a requirement, the security-minded will focus on how to build a system that cannot do anything but meet a requirement. The difference is subtle, but critically important...
May 28, 2011 Added by:Rahul Neel Mani
Innovation and doing more with less are not just buzzwords. That doesn't mean having Systems up and running can take a back seat either. David Awcock, Head of Technology Standard Chartered Bank, shares his ideas in an interview with Minu Sirsalewala Agarwal, on how he manages both...
May 23, 2011 Added by:Robert Siciliano
With the openness of social media, predators know what a kid likes, doesn’t like, who their friends are, and often their phone numbers, where they live, go to school, sports teams they play on etc. The list goes on and on...
Update 3: Hackers May Leak Norton Antivirus ... Jhun Astillero on 03-05-2015
Steps Toward Weaponizing the Android Platfor... arisha nani on 03-05-2015
Securing Bitcoin - The New Frontier... williama willis on 03-05-2015