2020 has seen IT executives dealing with major disruptions, and many are still uncertain about what IT will be like on the other side of the worldwide health crisis. To read this article in full, please click here (Insider Story)Details
Zoom, Microsoft Teams, Google Duo, Cisco Webex, FaceTime, Jitsi, Signal and WhatsApp. What does their encryption look like? What are the trade-offs?(Insider Story)
Two vulnerabilities in SAP ASE’s Cockpit component leaves some sensitive information available to anyone on the network and other data susceptible to brute-force attacks.
We are proud to announce our new brand and site design. Slicker and faster, the new design represents a more professional look at our expanding services and better reflects who we are. No ephemeral bombastic statements. Only fact. Our new site will be expanding shortly to include new features and experiences. Watch this space and…Details
When the pandemic hit the U.S. with a vengeance, most companies made on-the-fly decisions to shut down the workplace, forcing employees to make the switch to work from home with little to no warning. Ensuring that everyone had the right equipment and the ability to connect to the corporate networks – and do so securely…Details
What is your number one priority? Imagine if the CIO’s job could be described with that kind of clarity. Well, as a matter of fact, it can be. Corporate boards and the c-suite may not spend too much time thinking about information systems (unless they are an information systems company) but one thing they definitely…Details
When faced with the COVID-19 crisis earlier this year, Adobe’s IT organization, like many others, acted quickly to shift the entire company to a work-from-home situation. For us that meant moving the entire Adobe workforce of more than 22,000 global employees over a single weekend. The pandemic also forced us to focus more critically on…Details
“How should we adapt our cybersecurity controls to address the new WFH reality?” This question is top-of-mind for CIOs and security executives. When it comes to cybersecurity in the post-COVID era, every CIO needs an answer to three key questions: What are the changes in usage patterns and architecture in my IT environment? How do…Details
Artificial intelligence and machine learning bring new vulnerabilities along with their benefits. Here’s how experts minimized their risk.
Organizations must prepare for collecting, processing, analyzing, and acting upon terabytes of security data.(Insider Story)