Why the best cybersecurity lessons are from Star Trek
Brig Gen (Ret) Greg Touhill, former information security chief of President Obama and now Cyxtera Federal Group president, looks at the cult series from a different perspective
Brig Gen (Ret) Greg Touhill, former information security chief of President Obama and now Cyxtera Federal Group president, looks at the cult series from a different perspective
Of the 35 technologies featured in the report, four are judged to be ‘transformational’
The CIO role is complex and difficult, and if you hope to be successful in the long-term you need to look after yourself, writes Owen McCall.
Investments in marketing technologies are on the rise, but syncing them with existing systems is another story.
Anyone worth their salt in information security will tell you a solid defence is built upon multiple layers of technology, policy and practice. That's defence - in-depth.
The technology layers are a critical piece of that puzzle -- of course. But companies that suffer a major network breach have frequently failed on a more fundamental level. Here are the deadly network security sins experts say are rampant in the corporate world. Avoid these sins and you will have taken a critical step toward a secure network.
Renting software and accessing it through a website sounds like a good idea and has been pushed endlessly by sections of the IT industry, but the idea has been having trouble gaining traction.
But analysts now seem to have a better fix on the SaaS (Software as a Service) trend and they say small to mid-sized enterprises (SMEs) are coming on board.
Consumer expectations put a strain on IT Services teams at a time when resources are limited, costs must be contained, and IT environments are increasingly complex. up. Service and Support Desk agents are under far greater scrutiny and pressure to meet performance metrics and KPI’s. For automation to be effective, it needs focus, precision and speed. Download this whitepaper to see how the role of ITSM and businesses are looking to IT Service Management as a business enabler rather than an overhead.