Month: March 2018

It appears that the information technology stakeholders responsible for protecting enterprise IoT setups are not prepared for such work, especially where it concerns mitigating third-party risk.

Report: IT stakeholders doing little to address IoT cyberattacks

It appears that the information technology stakeholders responsible for protecting enterprise IoT setups are not prepared for such work, especially where it concerns mitigating third-party risk.

Continue Reading
SonicWall recently analyzed insights collected from approximately 1 million sensors in 200 countries and gathered testimony from respected data security consultants to formulate a sweeping picture of the modern cybercrime landscape.

SonicWall: The digital threat environment is intensifying

SonicWall recently analyzed insights collected from approximately 1 million sensors in 200 countries and gathered testimony from respected data security consultants to formulate a sweeping picture of the modern cybercrime landscape.

Continue Reading
The Technology Modernization Fund Board, an assembly of seven federal information technology stakeholders tasked with leading government IT modernization efforts, convened for the first time earlier this month.

Federal IT modernization moves forward

The Technology Modernization Fund Board, an assembly of seven federal information technology stakeholders tasked with leading government IT modernization efforts, convened for the first time earlier this month.

Continue Reading
Here four of those cloud implementation perils and how companies embarking on the adoption journey can avoid them.

3 implementation mistakes cloud adopters should avoid

Here four of those cloud implementation perils and how companies embarking on the adoption journey can avoid them.

Continue Reading
Verizon Wireless recently connected with more than 600 enterprise mobility experts from across the globe to assess the state of corporate device security programs.

Verizon: Businesses are falling behind on mobile security

Verizon Wireless recently connected with more than 600 enterprise mobility experts from across the globe to assess the state of corporate device security programs.

Continue Reading
Here are some strategies for businesses looking to put into place effective IoT systems that bolster the bottom line now and into the future.

Strategies for getting the most out of modern IoT technology

Here are some strategies for businesses looking to put into place effective IoT systems that bolster the bottom line now and into the future.

Continue Reading