IT Strategy

IT Strategy news, analysis, research, how-to, opinion, and video.

01 intro prediction
Thoughtful businessman question

rtx2i8y7 2

Yes, Uber can – and will – get worse

It might be hard to imagine how things could get worse for Uber – but they will!

0630 satellite atm indonesia

Red Bull’s Eye in the (Cyberspace) Sky

AT&T recently announced they will provide full time Internet-of-Things (IoT) monitoring of up to one million Red Bull coolers in retail locations worldwide.  If successful, this will be a powerful example of what Big Data can...

teamwork puzzle organized pieces together

Ancient lessons for a modern security program

As security programs become more and more complex, the need to see as much of what’s happening as possible is becoming one of the most critical aspects of success for any organization. But with complexity comes a need to specialize,...

5956775821 5ac6842f29 o

Britain’s eyes on the prize

Britain's new cybersecurity office is designed to partner with business to best protect the nation's digital interests.

cybersecurity shield and gear image

Cisco and IBM announce historic cybersecurity partnership

Cisco Security and IBM Security join forces to battle cybercrime, helping customers reduce the time to detect and mitigate threats.

3 keychain keys

Outsourcing security: Would you turn over the keys to a third party?

Years ago it would have been unthinkable to give up control to securing your most valuable assets. But for some companies the risk of handing the security keys to a third party is less than the idea of facing the daily barrage of...

crisis management meeting

8 ways to manage an internet or security crisis

IT, communications and security experts share tips on what to do when your business is hit with an IT-related disaster, such as a cyberattack, an ecommerce site crash or a software failure.

emmanuel macron france

Newly elected French president raises questions in trying to dupe hackers

Emerging trend of cyber deception, revealed by Emmanuel Macron, may be a slippery slope.

mobile forensics

Computer forensics follows the bread crumbs left by perpetrators

As investigators, these security pros let the clues lead them. See in a few examples how commercial software helps these techies solve the crime.

1 measure roi

10 ways CSOs can achieve ROI on a network solution

Setting up and protecting the network infrastructure is a major challenge and needs to be even more sophisticated and dynamic than ever before. Here are 10 points that need to be considered to achieve ROI and deliver payback

H-1B visa Statue of Liberty America

Cybersecurity industry braces for tighter visa rules

The current climate surrounding visas, immigrants and international travel will change the way some tech companies operate, and may harm US cybersecurity -- but there is also a chance that it will inspire more Americans to enter the...

office freelancer computer business

Humans are (still) the weakest cybersecurity link

Companies are regularly compromised by social engineering schemes, such as phishing and ransomware. Here’s what they can do prevent attacks and, if that’s too late, mitigate the damage.

wikileaks mobile

12 ways to defend the network inside and out

Wikileaks is consistently sharing information with the public that was intended to remain confidential, if not top secret, by organizations thought to have the toughest security in place. Add in the numerous other breaches reported in...

it project failures

The 7 worst automation failures

A list of the moments when technology monumentally backfired.

thinkstock privacy please

FCC privacy ruling could leave enterprises' data vulnerable

The recent repeal of new FCC rules designed to strengthen personal privacy among consumers by limiting the uses ISPs can make of their personal data also has implications for companies who use these services. Security and privacy...

manometer measure pressure

What makes a good application pen test? Metrics

Research from application security crowd testing and bug bounty program provider Cobalt attempts to define what enterprises could measure to improve results

pollution smoke energy

How CISOs can overcome cybersecurity pollution

How to assess a cybersecurity vendor in simple, unbiased and efficient manner?

burlap money bag

Enterprises misaligning security budget, priorities

Those on staff who are doing the budgeting might blindly write the same amount into the security line every year. Or the C-suite might handcuff the security personnel with a tight budget that doesn’t allow for expansion into new...

Load More