|
Viewpoint: Black Duck Software Inc Open Source software has become an important resource for developers and IT professionals who are building next generation applications. According to Gartner, virtually all Global 2000 companies use Open Source to run critical infrastructure. During a 2016 audit, Black Duck Software found open source code in 96% of applications. Read More ▶ |
Mobile malware? Some mobile security threats are more pressing. Every enterprise should have its eye on these issue in the coming year. Read More ▶ | |
It's a good idea to load up on inexpensive little gadgety gifts. For stocking-stuffers, or just to fill in the gaps when you've run out of ideas. Here's a shortcut to find Amazon's best-rated tech deals under $25 right now. Read More ▶ | |
Concerned about your network defense? Watch this short video to learn the 7 stages of the cyber kill chain, a framework created by Lockheed Martin to outline the phases of a targeted cyberattack. Watch Now ▶ | |
|
Machine learning will make sense of the security threats your organization faces and help your staff focus on more valuable, strategic tasks. It could also be the answer to the next WannaCry. Read More ▶ | |
Some information security insiders raised a red flag when Russian requests to review security software code became known. The controversy may be a tempest in a teapot. Read More ▶ | |
It's been a busy year for mergers and acquisitions in the IT industry, with a number of billion-dollar deals that did happen, or may yet do so. There's been action in cloud services, storage, microprocessors and transport. Here's our round-up of some of the biggest deals that matter to CIOs. Read More ▶ | |
Both bitcoin and blockchain are vulnerable to attack. Here's what you need to know to protect yourself and why blockchain is becoming a foundational technology. Read More ▶ | |
Salesforce Classic isn't going away anytime soon, but that doesn't mean you shouldn't be planning your move to the new Lightning UI. Here's a transition guide for the bewildered. Read More ▶ | |
Enterprises don't seem to be paying attention to data integration as they move to the cloud, and so won't find the business value they're seeking Read More ▶ | |
Shy? Networking probably feels like a brutal trial by fire. These 17 strategies will help you do it well -- and keep your sanity. Read More ▶ | |
When the flame driving your career flickers out, it's time to tap into a new energy source. Read More ▶ | |
The much-hyped, little-understood distributed ledger technology takes aim at big business, with promising pilot programs and rising demand for blockchain skills, though security and buy-in questions remain. Read More ▶ | |
Sure, nobody's perfect. But for those in charge of enterprise technology, the fallout from a strategic gaffe, bad hire, or weak spine can be disastrous. Here's how to avoid (or recover from) big-time IT leadership mistakes. Read More ▶ | |
White Paper: Digital Shadows CISOs and risk officers must adopt a thorough digital risk management strategy that includes monitoring, filtering, prioritizing, and responding to threats across the public Internet and dark web. Read More ▶ |
0 comments:
Post a Comment