By Paul Rubens, Follow CIO | Apr 1, 2015 Many CIOs endanger their companies simply by not spending enough on...
Technology Management
CONTINGENCY PLANNING GUIDE FOR INFORMATION TECHNOLOGY SYSTEMS Elizabeth B. Lennon (Editor) Information Technology Laboratory National Institute of Standards and Technology...
Jeremy Kirk IDG News Service Mar 13, 2015 A Google software problem inadvertently exposed the names, addresses, email addresses and...
Joab Jackson IDG News Service Mar 10, 2015 With the latest Patch Tuesday release, Microsoft is fixing the FREAK vulnerability...
By Joe Schreiber - solutions architect at AlienVault 6th March 2015 Getting breached doesn’t establish whether or not you have...
By Judy Greenwald Home Depot Inc. incurred $33 million of pretax net expenses related to last year's data breach in 2014,...
Mark Hachman@markhachman Mar 5, 2015 5:46 AM Microsoft has said previously that its upcoming DirectX 12 API will make your...
By ipcamnetwork One of the biggest benefits of having IP cameras is being able to access them from the internet....
February 25, 2015 11:37 AM PST by Joshua Goldman @ByJoshG Having auto-follow capabilities on a drone means that it can...
February 21, 2015 6:00 AM PST by Matt Elliott @themattelliott A nefarious individual could purloin your Mac and bypass your...