Analyses

facebook workplace

Small businesses are prime targets for cyber attacks: SIEM-as-a-service can help

Netsurion’s SIEM-at-the-Edge puts enterprise-level detection and response capabilities in the hands of SMBs


mobile pay retail ecommerce ts

8 retail technology predictions for 2017

Consumer confidence reached new heights in 2016, technology contributed mightily to the retail and ecommerce success. Here are the top tech predictions for retail in the coming year.

software intellectual property.jpg

What 2017 holds for enterprise software

Enterprise software vendors discuss what will be the trends and innovations in business intelligence, CRM, ERP and marketing automation software in the coming year.

Talent compass pointing to the most highly skilled jobs hiring

10 biggest recruiting and hiring trends of 2016

IT recruiters faced a challenging 2016 and had to get creative to find the elite talent their clients needed. Here are CIO.com's top 10 recruiting and hiring stories from a busy year.

security detection monitoring

4 information security threats that will dominate 2017

Cybercriminals are becoming more sophisticated and collaborative with every coming year. To combat the threat in 2017, information security professionals must understand these four global security threats.

Using big data for security only provides insight, not protection

Machine learning provides the protection big data analytics lack. Instead of figuring out why a breach happened after the fact, machine learning can identify a data breach as it’s happening

hadoop

DIY vs. fully integrated Hadoop – What’s best for your organization?

The trade-offs of building it yourself vs. going with a pre-integrated, out-of-the-box platform

ssd

Solid state drives are now larger than hard disk drives: The impact for your data center

Because SSDs are scaling at a faster rate than HDDs, we will never look back

Man building miniature brick wall

Event-driven infrastructure and the move to higher worlds

The new bastion of infrastructure isn't about servers, containers or services. Rather it is about micro functions triggered by certain events.

angry broken

IoT product development is broken – 6 ways developers and manufacturers can fix it

The burden of securing connected devices – and responsibility to find fixes when a vulnerability is exploited – falls squarely on product manufacturers and developers

business analytics 2016

Top 4 big data and analytics trends of 2016

Big data and advanced analytics continued to make inroads in the enterprise in 2016 as organizations learned how to interrogate data to better understand their customers and drive efficiencies.

ethernet

The Ethernet ecosystem today is driven by applications, not speed alone

Diverse applications in new and traditional industry verticals expand the Ethernet family

ransomware contained container

Use virtual containers to isolate ransomware

Keeping suspicious files and connections in a separate container – a virtual space isolated from the rest of the network – is a savvy strategy that can save you time and money

Identity verification: The New Turing Test

The irony is, the bad guys can often meet the current ID requirements better than actual customers

volvo mcdonalds merger primary

Volvo lures McDonald's CDO to drive digital transformation

The Swedish car maker hires Atif Rafiq to accelerate a digital transformation. At McDonald’s, Rafiq oversaw the launch of digital kiosks and table service at the fast-food chain.

cyber security insurance protection

Best practices for lowering cyber insurance costs and cyber risk

If your cyber insurance vendors offer incentives or discounts for companies who meet high data security and protection standards, they will likely focus on these processes and controls

isolation threat dark web

Isolation technologies create an “air gap” to eliminate the risk of malware

Web requests are proxied to the isolation platform, which executes and renders web sessions remotely, and only a safe visual stream is sent on to users

iot security ts

Retailers get an IoT wake-up call

The recent Distributed Denial of Service (DDoS) attack that infected internet of things devices should serve as a warning to retailers that are investing heavily in IoT tech this holiday season and beyond.

microservices

Micro services: Breaking down software monoliths

Massive enterprise architectures are collapsing under their own weight. Developers are decoupling massive system architectures into small, independent functions that loosely work together to solve complex problems

Load More