The infernal infrastructure-as-a-service magic quadrant report was published by Gartner, marks Amazon as a "leader" of cloud technologies, trailed by CSC. More>>
Author: admin
5 Truths Your IT Asset Manager Should Know About Data Erasure
IT asset disposition is an area that can make a company’s data security vulnerable. At a time when a single data breach could cost millions, you can’t afford the risk of allowing any IT equipment to leave its control with sensitive data still stored on it. There are many misconceptions
Big Data Security: 5 Questions You Need to Ask
Though big data offers a wealth of information and valuable insights that can help businesses make better decisions and increase profits, the is likely to pose substantial security risks that range from disastrous data breaches to issues with compliance and incident management. Check out the free report that outlines critical
Big Data and the Role of the CIO
Because CIOs are positioned at the nexus of the information flowing into and out of the company, the rise of big data provides them with a unique opportunity to demonstrate their strategic importance, according to Ernst & Young. While the rise of big data on the corporate agenda might provide CIOs
Healthcare Industry Sees Big Data As More Than a Bandage
The promise of big data in healthcare--increased inefficiencies, better outcomes, more personalized care--is undeniable. How the industry reaches the promise land will happen in many stages, but hospitals and insurers aren't wasting any time getting started. More>>
Employee carelessness among top causes of data theft
According to the findings of the Global Corporate IT Security Risks 2013 survey conducted by B2B International and Kaspersky Lab, employee error is one of the main causes of internal IT security incidents leading to leakage of confidential corporate data. More>>
10 small devices. No, we mean really small
From the world's tiniest semiconductor laser to a bee-sized flying robot, these minuscule devices -- many of which cannot be seen by a human eye -- are changing our world. More>>
How to Evaluate Moving Legacy Mission-Critical Apps to the Cloud
5 Cloud Computing Security Tips for 2013
Cloud computing is becoming more popular every year, and many are predicting that 2013 will see a real explosion in the popularity of cloud computing. While the advantages of cloud computing have been discussed at length, there are a couple of potential dangers. However proper security protocol can help prevent
79% of CIOs are concerned about hidden costs of cloud computing
A survey conducted by Research In Action showed that 79% of the CIOs thought of the potential hidden costs of cloud computing. The costs here can be anywhere from subscription fees, system and staff setup and training. Here are the detailed concerns they have of cloud computing migration. More>>

