When it comes to the exploding costs and risks of litigation that are a result of the deluge of electronic information available, a counsel general’s...
Security
Security: CIO Talk Network delivers Top Security Podcasts, articles, interviews, talks, blogs, events, insights and more by thought provoking I.T, Management, and Technology Leaders.
Download and listen to Best Security Podcasts now.
Education is an important investment for students and society depends on educational institutions for developing our society’s future leaders and...
Today, organizations are outsourcing more and more of their IT applications, systems, and infrastructure, and moving to the cloud. But can their IT...
Cloud Computing Benefits are obvious. Cloud computing companies can provide flexible, scalable infrastructure resources on demand, without the need...
2010 Saw Increased Fraud: Payment card and check fraud was #1 & 2, phishing/vishing #3, and ACH/wire fraud #4. Financial Services, Retailers...
As a world we’re vulnerable to malefactors with a plethora of ways to create havoc and uncertainty in our lives and businesses. On the other hand, as...
The financial meltdown is bringing a new discipline to the investment services industry. Cost inefficiencies and malpractice are under attack...
What started as computer security, morphed into information security, and is now being called “information assurance.” This includes the managing of...
While most of us advocate energy efficiency and sustainability, it comes with a price tag. For one thing, links in the energy value chain such as...
IT leaders are used to thinking of IT governance as a way to optimize IT to create and deliver value. However, when economic times turn tough there...
No one is secure from the relentlessly morphing and multipronged threats facing the Internet. These threats are real and must be met with a cohesive...
There are risks inherent in all new technology. Sometimes these risks get blown out of all proportion in comparison to the advantages these new...
While each state has its own technology issues, they all face similar internal problems related to cyber security. There is also a need to create a...
Today’s IT security is only as effective as the human beings who implement and monitor it. Technology may promise self healing, intelligent...
Most innovations including virtualization, SOA, and Web 2.0 are still not fully cooked and have security vulnerabilities. Furthermore, there are more...
Software companies now release thousands of patches every year. To make the process efficient, organizations using the software are deploying patch...
Today’s IT environment is a mixed bag of legacy systems, hosted applications, and enterprise software with their own authentication and authorization...
Whether it is theft or an employee scraping off pennies out of transactions and transferring to their checking accounts, technology can play...
Sarbanes Oxley compliance is here to stay. What are organizations doing to not only get the first time certification but also monitor ongoing...
In the last decade the role of enterprise security has evolved from a departmental function to a well funded and closely watched strategic function...