For many of us the Internet is like a new pet, we love to play with it but sooner or later we know we are going to get bitten. We...
By Nate Lord The amount and variety of malicious programs out there is enough to make your head spin. This blog post will break down the common types of malicious programs...
  Put the potential of falling off the fiscal cliff aside for a minute and you will discover some promising hiringnews in the tech sector according to CIOs and other technology managers....
Neglecting to take proper security measures at the application layer is one of the most common causes of data breaches, yet many companies still leave their applications unprotected. Securing your applications...
Many CIOs are not only in charge of IT for their organizations but many of them have embraced social media to communicate more effectively with employees, customers, and vendors.   According...
Cloud storage is an important part of both business and consumer computing today. With fast internet connectivity, uploading and downloading small documents, pictures, and videos via the internet is a simple...
As IT users move off desktops and laptops and embrace the location-agnostic freedom offered by smartphones and tablets, CIOs are grappling with providing new IT and business services to their staff...
Protecting your information and data is nearly a requirement in today's world. Previously, computer information was only susceptible to prying eyes after your dial-up connection was established. Once you were...
Shocker I know but this is how many old school large companies are run. Board level appointments are often made to more senior individuals that previously worked in a CEO or...
  When purchasing bundled software and hardware, many of us wish to know how long the manufacturer will support the product. With MS Windows, the product lifecycle of each version of Windows...
We just reported that Cisco's quarterly results managed to beat Wall Street's expectations, directly supported by big bets on some fast growing Internet business trends.   They reported its net income...
By Rainer Enders   There is a difference between enabling a mobile workforce and enabling a BYOD (bring-your-own-device) workforce.Companies need to mobilize, that is without question -- but for too long...
    Research firm Gartner recently announced the strategic technology trends that IT will most likely deal with in 2013. From the proliferation mobile devices to concerns over HTML 5, there...
  Batman, Meet Robin: How Big Data Transforms the CMO and CIO Into a Dynamic Duo As Marketing and Technology Converge, CMOs and CIOs Must Work Together Like Never Before By...
A report by Gartner and the Financial Executives Research Foundation suggests that the CFO is increasingly becoming the top IT decision-maker in many organizations.   The study, which is based on...
Recent research demonstrates some of the quantifiable benefits and complexities associated with allowing employees to use their own mobile devices on their employers' networks.   Most CIOs encourage BYOD throughout their...
By David Hunter Tow     The Director of The Future Enterprise Research Centre- David Hunter Tow, predicts that Big Data  has the potential to unlock greater value for the enterprise...
Cloud computing. Mobile technology. Big data. Social networks. With so many disruptive technologies on the horizon, timing your move into each can make the difference between getting ahead of the competition...
By Ken Westin You have 5 minutes to explain why you are relevant to the business and define your organization’s risk posture…ready…set…GO!!! Recently I presented for the first time at Ignite....
The advent of the savvy end-user and the trend towards BYOD has changed the way in which services must be provided by IT. As smartphone capabilities further develop, so does the...