Information Technology Editor's Pick


Subscribe to the InfoTech eNewsletter

Editor's Pick

Maps Can Be a Core of Digital Transformation in the Enterprise
January 17, 2018 - 10:21 AM
2018 may very well be the year of digital transformation (DX), as companies commit to making sure digital technology is driving efficiencies at every level. Chief Information Officers (CIO)s and other decision makers should take a hard look at the humble map - a digital powerhouse of data and media - as a fundamental element in digital transformation at the enterprise level.

Cybersecurity Concerns on the Horizon for 2018
January 15, 2018 - 10:47 AM
Vigilance and foresight are two key qualities in the cybersecurity field. 2017 brought many serious challenges, but what lies ahead in 2018 that needs our intention and strategic thinking?

How Financial Services Firms Can Overcome Security Concerns
January 12, 2018 - 5:27 PM
As the financial services industry continues the transition to a digital business model, customers expect new digital capabilities. Customers have gotten used to 24/7 access to their financial accounts, for instance, and expect ongoing application enhancements that provide more customized products and services.

Protect Your Assets, Align Your Coverage, and Win the War, Not Just the Battle
January 11, 2018 - 11:01 AM
The current technological landscape is burgeoning with opportunity and seemingly limitless innovations, but the threat of cyber attack has never been more real.

History's 10 Biggest Cyber Attacks
January 11, 2018 - 10:20 AM
Cyberattacks, also known as computer network attacks (CNA), are deliberate exploitations of your computer system or of an enterprise or network that's dependent on technology. They use malicious code to disrupt your computer. This results in cyber crimes including compromised data and identity theft.

The State of Microservices Survey
January 8, 2018 - 10:41 AM
During the fall of 2017, we conducted a microservices survey with our Red Hat JBoss Middleware and Red Hat OpenShift customers. From this, we were able to discover how these customers are using microservices to their advantage, what they see as some of the major benefits, what challenges exist and how to overcome them and how microservices can give respondents a competitive advantage

Google Email Hijacking & Information Security: Staying Safe in 2018
January 4, 2018 - 1:09 PM
In November 2017, Google announced the results of a year-long email and social media hijacking study that began in March of 2016. In the report, Google announced that nearly 3.3 billion third-party breaches occurred during that period of time.

The State of Open Source Security Going into 2018
December 28, 2017 - 12:40 PM
The year is coming to an end, and along with a number of Hot Tech Trends gaining momentum, the open source landscape continues to grow and diversify. It is important to evaluate the state of open source security in order to know where we stand and what can be improved. This article will provide you with the basics.

Tips for Maintaining Network Security
December 15, 2017 - 9:47 AM
Network security is absolutely essential for every business in this day and age, given the plenitude of entry points for cyber attackers. In fact, the threat of cyber attacks becomes more real every year, as yet another large corporation loses millions of personal financial information - which becomes a very costly proposition once consumers assess the damage and litigate.

10 Essentials for Businesses in the Middle East to Stop Ransomware Cyber Attacks
December 12, 2017 - 10:35 AM
Ransomware is today the number one cyber threat to businesses. Since cyberextortion first appeared in 1989 as "PC Cyborg," it has grown, evolved, and come into widespread use among hackers-and in 2017 it has fully come of age.

An Introduction to Cloud Asset Management
November 29, 2017 - 3:38 PM
The proliferation of Cloud is only set to continue, with predictions suggesting that over 80% of IT budgets will to be committed to Cloud apps and solutions by mid-2018.

ONAP Goes to Amsterdam
November 29, 2017 - 3:28 PM
The Open Network Automation Platform Project has come out with its first deliverable since it was created by the merger of ECOMP and the Open Orchestrator Project, or OPEN-O. That deliverable is a platform called Amsterdam that provides a unified architecture for service automation and orchestration.

New Multi-gigabit Ethernet Switches Bringing the Ruckus
November 29, 2017 - 9:08 AM
Recently, Brocade''s Ruckus unveiled its new family of multi-gigabit Ethernet switches, the Ruckus ICX 7650, to support the rigorous network demands of today, and prepared to tackle the requirements of tomorrow.

What's Driving Growth in Ethernet Controllers
November 29, 2017 - 8:52 AM
The Ethernet controller market this year is valued at more than $8 billion. It's poised to approach $12 billion by 2023. Servers will be the leading application, according to new Markets and Markets data.

IT's Role in Keeping Retailers Off the Naughty List This Holiday Season
November 27, 2017 - 3:49 PM
As retailers prepare for the onslaught of online and in-store shoppers this holiday season, so much relies on their IT infrastructures. Most U.S. retailers count on nearly 70 percent of their annual sales to come solely from the last three months of the year, leaving little or no room for mistakes.

The Weakest Security Link is Poor IT Hygiene
November 27, 2017 - 2:10 PM
In the rush to adopt, deploy, and manage new technologies, many organizations are failing to maintain basic security practices. Recent research from FortiGuard Labs' Global Threat Landscape Report reveals that poor cybersecurity hygiene, including the failure to patch or replace vulnerable systems, has enabled sophisticated worm-like attacks to take advantage of known exploits at unprecedented speeds and scale.

TMC Announces the Winners of the 2017 infoTECH Spotlight Data Center Excellence Award
November 15, 2017 - 2:01 PM
TMC, a global, integrated media company helping clients build communities in print, in person and online, announced today the winners of the 2017 Data Center Excellence Award, presented by infoTECH Spotlight.

Gain a Complete IT View: Integrating ITSM with SAM
October 19, 2017 - 10:54 AM
There is a common misconception that ITSM and the service desk are the same thing. ITSM actually offers a much broader scope, covering a variety of IT management capabilities related to service delivery and support, with the service desk forming a part of this. To properly manage both ITSM processes and service desk issues, access to IT data is critical for helping to improve fixing times and efficiency. However, there are limitations in accessing the necessary information.

GDPR is the new Y2K, and it's the Wake-up Call your IT Needs
October 2, 2017 - 12:00 PM
We have all spent countless hours attempting to become experts on GDPR. If you're anything like me, you still feel a long way from full understanding. Unfortunately, clear or not, the urgency is real.

A Layered Approach for Today's Network Threat Landscape
September 28, 2017 - 1:35 PM
From the beginning of networked computers until very recently, IT security professionals have aligned with the idea of defending the network's perimeter - shore up defenses to keep the bad guys out. This is also known as "security prevention."

Encryption 2018: Gaining Traction Beyond Email
September 27, 2017 - 1:21 PM
We're living in the age of the digital security breach. So far in 2017, we've seen security issues involving as many as 14 million Verizon subscribers, 77 million accounts connected to edtech platform Edmodo, a serious malware attack on the Mac video program Handbake, and of course the recent high-profile breach at Equifax. What are we doing wrong?

Using Technology for Information - Colleges and Universities Transfer
September 21, 2017 - 11:17 AM
The evolution of technology has definitely managed to overcome barriers created by time, distance and more importantly, the lack of information.

Why Low-code Development Platforms Are So Much More Than a Beginner's Tool
September 21, 2017 - 10:42 AM
As digital transformation becomes a reality across all industries, organizations are realizing the limitations of their legacy software and traditional business processes.

Quality Over Quantity: The Art of Software Normalization
September 19, 2017 - 11:12 AM
When it comes to a normalization service - and the database of information which underpins it - there are certain nuances which need to be considered. So it's timely to take a closer look and dispel some of the myths.

Surprising Places to Find Discount Software Online
September 19, 2017 - 11:06 AM
Chances are whether you are a student, business, or working professional, you are going to need to buy software to help with a project. Buying just two or three programs can leave with a hefty bill.

The Business Value of Automation
September 18, 2017 - 10:59 AM
A broad spectrum of technologies, solutions, processes, and skillsets is available to help manage a large scale environment. Among management technologies, automation is one of the most powerful.

8 Fastest Growing Cybersecurity Companies Right Now
September 15, 2017 - 2:02 PM
The cyber security service is the fastest growing market for the computer security in all the sectors from banking to defense and business organization. With this many new cyber security companies emerged in the scenario. Here are the 8 fastest growing cybersecurity companies.

What to Look for When Hiring an Android Developer
September 15, 2017 - 1:46 PM
There are plenty of practical steps you can follow when it comes to hiring the right person, but when it comes to hiring someone who specializes in a specific technical skill, you may not know exactly what you need.

When Androids Attack: Protecting Against WireX Botnet DDoS Attacks
September 15, 2017 - 7:00 AM
It appears Mirai may have some competition. And its name is WireX.

Is It Possible to Decrease Online Fraud with Blockchain Technology?
September 5, 2017 - 2:37 PM
Information age has made a lot of changes in our lifestyle, environment, and how we do business especially online.

Top 6 IT Asset Management Tips
September 5, 2017 - 2:08 PM
Successful asset management is important to any organization or company so that inventories can be accurately evaluated, reducing the likelihood of equipment being stolen or lost.

Why We Should Let Our Walls Down When it Comes to Cybersecurity
August 16, 2017 - 2:07 PM
With digital threats growing more rampant across the country and from around the world, the idea of building "walls" for cyber defense and protection can seem appealing. But even in this age of hackers relentlessly penetrating our networks, in the information technology security industry, we know that walls don't work.

What to Watch Out for in Enterprise Application Development this Year
August 14, 2017 - 2:22 PM
Enterprise application development is expected to break new ground this year. The list of trends in enterprise application development could go on and on, with some of the features such as increased adoption of hybrid apps being among the things to expect in 2017.

Rapid Global Cloud Growth Calls for Engineering Talent
August 14, 2017 - 1:24 PM
The latest forecast from the Gartner Group shows that overall demand for cloud computing will grow 18 percent this year to $246.8 billion in total worldwide revenue, up from $209.2 billion in the previous year.

The Top Tech Hubs You Should Move to in the South
August 11, 2017 - 9:00 AM
Technology is going to play a significant role in our future. In the U.S., Silicon Valley and New York are famous for being hosts to amazing tech ideas transforming the world. Many states in the south are also picking up as well, establishing technological ideas and gradually becoming tech hubs capable of competing with California. If you are thinking about moving south, here are the top places to consider.

The Four Headwinds Facing IT
August 10, 2017 - 4:27 PM
There are four headwinds facing IT today-four opposing forces that can impede, or even reverse, success for enterprise IT.

How Backup Can Help Businesses Protect Against Ransomware
August 9, 2017 - 8:39 AM
Paying ransom fees to regain access to data in the vague hope that criminals will release files they're holding hostage is a known phenomenon that continues to demand regular column inches. But currently, with ransomware on the rise, no company wants to get into the habit of paying out a ransom fee to access their own services.

Understanding the Value of the Intranet in Today's Organizations
August 8, 2017 - 3:36 PM
Can you imagine life without the Internet? Think about how many tasks you complete each day with its assistance. There are probably too many to count. Now consider whether or not your company is using an intranet. If not, you're missing out on a major opportunity to optimize efficiency and add value to the bottom line.

How to Excel as a Remote IT Worker
August 8, 2017 - 10:44 AM
As remote working becomes more practical, a lot of IT professionals are discovering that it's lucrative to travel around and visit clients on-site. However, if you're going to do this, you have to make sure it's worthwhile for you.

Legacy Technology, IT Modernization and the Time Travel Machine
August 4, 2017 - 8:00 AM
It takes agile, newer technologies to delight and surprise customers, but most organizations are staggering under the weight of legacy infrastructure. Application Program Interfaces (APIs) are the magic time travel machines that facilitate legacy modernization strategies, by linking legacy systems with the latest functionalities. What's more, it's at a fraction of the cost it would take to embark on elaborate projects to migrate from the legacy.

Big Data Predictions for the Next Five Years
August 4, 2017 - 7:00 AM
Here are five bold - yet reasonable - predictions into where big data will take us in the next five calendar years.

Going Digital in the New Era of Data Chaos
August 3, 2017 - 11:14 AM
Today's era of 'data chaos' - the point where the size and growth of unstructured data vastly outpaces structured data - has created a pressing requirement for companies to transform information management and storage strategies to improve operational efficiency and ensure profitable growth.

Tips for Choosing the Best Web Analytics Tools
August 2, 2017 - 3:17 PM
Every business that has an online presence should already be using Web analytic tools. Information gathered through these tools will help you increase and retain site visitors, improve click-through on your email campaigns, measure attribution of user actions to conversions, increase search engine ranking, and maximize earnings from e-commerce and advertising.

Understanding the Impact of Big Data on Local Businesses
August 2, 2017 - 7:00 AM
Big data analysis offers businesses an opportunity to compete with bigger players in a competitive manner, unlike in the past. However, small businesses have yet to fully understand how to utilize the insights acquired from the analysis of generated data in order to gain a competitive advantage and stay ahead of the competition.

How to Automate, Streamline & Grow Your Business with ERP
July 31, 2017 - 11:03 AM
In the terminology of enterprise software, an Enterprise Resource Planning (ERP) for small business means simpler and lighter business management.

How to Overcome the Hurdles of Big Data
July 31, 2017 - 10:51 AM
Big Data is simply defined as a large collection of structured and unstructured data. This data is gathered in real time and stored for eventual analysis. Real-time analytics and big data give companies insights that can lead to better strategic business moves and decisions.

SSH Keys: Cybersecurity's Largest Blind Spot
July 26, 2017 - 12:14 PM
Picture this plotline from a cyber thriller: Someone self-provisions access to the deepest levels of your network, including all your critical systems. No one notices, and the access never expires. You have no way of knowing who that access belongs to. As if this wasn't bad enough, you learn that this someone has been poking around your infrastructure for the past 10 years. Is your heart racing yet?

Is Your Enterprise Data Secured?
July 21, 2017 - 8:50 AM
In this technological era, every day we have a new system, tool or device at our disposal. However, the ever-changing technology can pose a threat to your information. And most organizations are not very well equipped to handle any sudden threats. This in turn makes your organization vulnerable. The security issues are growing and an organization cannot be maintained without eliminating its system threats.

4 Innovative Ways to Finance Your Startup
July 21, 2017 - 7:00 AM
To avoid putting the cart before the horse, early stage startups need to be aware of all the options available, and when it comes to financing your startup, there are several innovative ways that can help you turn that brilliant idea into a reality.

What Does it Take to Excel in IT Consulting?
July 18, 2017 - 2:30 PM
IT consulting isn't for the faint of heart. Even the most ambitious and confident people can fail in this industry. But there are a select few who find unbelievable success. So, whether you've been in the business for decades or are just starting out, keeping up to date with the latest consulting best practices allows you to remain competitive and continue providing exceptional service to your clients.

Virtualization Detection Techniques Used By Malware
July 17, 2017 - 7:00 AM
The WannaCry malware outbreak isn't even over yet, but another new malware, Petya, has surfaced. Both of these malwares make use of vulnerabilities in the Microsoft Windows operating system. The vulnerabilities, namely ETERNAL BLUE and DOUBLE PULSAR, are believed to have originated from the NSA and were released by the group The Shadow Brokers earlier this year.

Three Ways to Generate Profit with the Data You Already Have
July 14, 2017 - 1:38 PM
Build it and they will come. That is the view many organizations maintain about their data lakes and data warehouses. Companies are rapidly investing in systems and processes to retain business data that they know is valuable but have no clue what to do with it.

5 Best Skills for a Data Technician
July 14, 2017 - 12:12 PM
Are you looking to become involved in big data by becoming a data technician? As big data companies continue to grow, data technicians will become even more in demand. To be successful in this field, they will be required to learn a variety of skills that could give them an edge over others. In this article we will be discussing the five best skills for a data technician to have.

24.7.365 Availability Keeps Customers Loyal
July 13, 2017 - 11:09 AM
The lightning-fast pace of technological innovation is forcing organizations to change the way they operate or risk falling behind. As IT leaders and analysts say, every company is now becoming a software company.

10 Critical Apps to Grow Your Business
July 11, 2017 - 3:28 PM
Entrepreneurship is a grand adventure: daunting, thrilling, and a lot of hard work. As you grow your business, it's easy to take on too much and to let key tasks slip through the cracks. The No. 1 way to stay on top of your game and scale effectively is to get organized!

The Most Advanced Big Data Streaming Systems
July 11, 2017 - 8:35 AM
Big Data sets are often created by the collection and parsing of streaming data, which is the name given to digital information that is generated and collected on a constant basis from a considerable number of sources. The data records streamed are often small enough to be measured in kilobytes, and they tend to conform to prearranged structures.

6 Items Your Help Desk Wish They Had
July 10, 2017 - 3:19 PM
Could your help desk use a little help of their own? It's very likely, but it's also common for help desk employees to be entry-level and uncertain about asking higher ups for an upgrade. However, making sure your help desk is kitted out with all the tools they need for success means that will trickle down to your customers. A happy, high-tech and smoothly operating help desk is a must for most companies. Unfortunately, it's often overlooked.

Why the Era of Automation Will Still Require the Human Experience
July 10, 2017 - 2:38 PM
The current era of automation presents the opportunity to eliminate mundane and repetitive tasks, taking many thankless chores off of workers' plates. Increasingly, discussions of automation, artificial intelligence and machine learning technologies assuming roles like driving, stock trading, telemarketing and manufacturing are making headlines. This trend is leaving room for a new kind of productivity in the workplace-and likewise, a new way of valuing human capital.

SSL Encryption: Clearing Common Misconceptions
July 10, 2017 - 10:24 AM
The amount of Internet traffic secured via SSL encryption is surging to new heights every day - it's estimated that nearly 70 percent of all Web traffic uses SSL encryption and 86 percent of that uses advanced encryption methods like Elliptical Curve Cryptography (ECC) and Perfect Forward Secrecy (PFS).

VAT Introduction is the Case for e-invoicing & e-archiving
July 10, 2017 - 7:00 AM
VAT will transform the way trading companies across the GCC conclude business transactions - be it an SME/ SMB or a large enterprise. It is the case for IT solutions, such as e-invoice suite and e-archive suite, to ensure a smooth transition to the new tax landscape and guarantee on-going VAT compliance.

NotPetya: The Ransomware that Spreads Like a Worm
July 6, 2017 - 8:00 AM
Barely after the dust has settled on WannaCry, the ransomware that affected hundreds of thousands of computers in 150 countries in May, another ransomware attack, NotPetya, started infecting organizations across Europe and into the Americas on June 27, 2017.

GoldenEye Ransomware Highlights Importance of Eliminating Network Blind Spots
July 5, 2017 - 2:16 PM
A wave of ransomware swept across Europe at an incredibly rapid pace, grinding business to a halt at banks, airports, pharmaceutical companies, government offices, service providers, utilities and more, security researchers said.

13 Best Practices for Eliminating Insider Threats
June 28, 2017 - 9:20 AM
Protecting your network from insider threats is just as important as defending against external ones. These 13 practices can help deal with these risks.

Common Problems Affecting Website Performance & How to Counter Them
June 26, 2017 - 4:05 PM
A website's performance varies for a number of reasons. Conducting stress tests, ramp tests and load tests as a performance checkup can create a clear image of the problem and provide insight into how to counter it effectively.

Best Free VPNs to Bypass Internet Throttling
June 21, 2017 - 2:33 PM
Back in the day, Internet throttling was only brought into play when it was needed. However, people are now downloading and streaming content almost all the time, which has led to an increase in their bandwidth consumption.

What to Ask Before your Company Invests in IT
June 20, 2017 - 1:54 PM
Seeking out the proper technology for your business needs is a difficult, and at times, frustrating task. When faced with a wide variety of options, business executives or owners may think that the best way to solve a problem is by using a company that provides a temporary IT employee. Unfortunately, this is only a Band-Aid solution, and once that employee's contract is up, the company is on its own, and, quite possibly, right back to where the trouble all started.

Four Reasons Why Microsoft is Losing the War to Secure O365
June 19, 2017 - 3:42 PM
According to Microsoft's own reports, it is about to surpass 100 million users on the O365 environment. That is almost 100 percent growth from a year ago. When there are that many users on any system, there are bound to be issues.

Five Essential Skills for a Career in Tech
June 19, 2017 - 2:50 PM
While research has shown that tech jobs are growing, why has there been such a push? Aside from the excitement surrounding innovation, technology careers seek to provide answers for problems that we all face in business and daily life. If you would like to be a part of a career that tackles these challenges directly, here are five important qualities to highlight when applying and interviewing.

The Ethics of Data Retrieval and Storage
June 14, 2017 - 9:14 AM
There are many companies making a lot of money in the big data industry. This has a variety of benefits for companies. Not only do they get to know customers better, but big data can be used to predict future behavior as well.

Lepide's Predictions for Ransomware in 2017
June 9, 2017 - 11:16 AM
Unfortunately, chances are that ransomware attacks will evolve to become even more malevolent than they already have been. New strains of ransomware will explode onto the scene, with greater scope, reaping even greater rewards. Infiltration and propagation methods will be ever-more stealthy and insidious.

Teaching Your Staff How to Use a Cloud-based ERP
June 9, 2017 - 10:00 AM
When it comes to implementing enterprise resource planning (ERP) software, managers often believe that the most important part of the process is choosing the vendor and software suite that best fits their needs. This is extremely important, of course, but the argument can be made that even the best ERP software is borderline useless if the end user doesn't understand how to operate it.

Is Third-Party IT Maintenance Better Than OEM?
June 8, 2017 - 8:38 AM
Most pieces of hardware come with an original equipment manufacturer (OEM) contract that covers various repairs and maintenance. It's simple, reasonable in cost, and effective, but many businesses don't realize there's another alternative in the form of third-party contracts. Instead, they stick with their expensive, "default" OEM contracts, and miss out on the potential advantages that third-party maintenance offers.

The Conundrum of Storing Our Data
June 6, 2017 - 4:45 PM
Big data presents a significant opportunity for companies. It can be used as a means to increase efficiency in a factory, produce leads for new customers and even forecast sales for products months or even years into the future.

New Netwrix Tool Improves IT Performance
June 2, 2017 - 1:08 PM
A new free tool from Netwrix, the Netwrix Auditor Free Community Edition, offers a simple, cost-effective way to maintain the network.

Which Managed WordPress Host is Right for You?
May 30, 2017 - 2:38 PM
If you've decided that Managed Hosting is perfect for you, the next step is choosing the right host. This can be a tough job - all hosts look very similar and the websites are full of technical jargon. So, how do you find a good one?

Do You Need Managed WordPress Hosting?
May 30, 2017 - 2:36 PM
No doubt about it, WordPress is one of the best ways to build a website. But how much thought did you give to choosing your Web host?

A Look at the Rise of Freelancing in the IT World
May 30, 2017 - 9:42 AM
There are lots of benefits associated with being a freelancer. Not only do you get to work remotely and set your own schedule, but you can also pick and choose clients and jobs based on what interests you. But do you know how to get started as a freelance IT pro?

WannaCry is Part of a Bigger Problem
May 26, 2017 - 2:30 PM
The vulnerability exploited by this attack had been patched by Microsoft months before. That patch was part of a widely publicized update that was issued in response to the massive set of NSA cyberespionage tools leaked by the secretive group known as Shadow Brokers. Everyone knew about it. Yet, apparently, few did anything about it.

Ensuring Business Continuity When Your SaaS Stops Providing the Service
May 25, 2017 - 8:51 AM
The hard truth is that there are some cloud security concerns. And the reliability of your SaaS provider is probably the biggest one. The main thing you want to avoid is a situation where you're manically searching for an exit strategy, making decisions on what you can afford to lose, knowing that you won't have enough time to salvage everything.

Important Features to Consider for Windows VPS
May 25, 2017 - 8:29 AM
Virtual Private Servers (VPS) are one the most beneficial and widely used programs in the world. They are ideal to use for Web hosting, secure mail servers, virtual desktops, or for running critical applications.

Do VPS Make You WannaCry?
May 23, 2017 - 3:38 PM
Virtual Private Servers (VPS) have had a rocky start to their creation. Although the technology exists, the security concerns have kept VPS from having a wider acceptance. Recent computer security hacks, such as the WannaCry ransomware attack, have given small business operators pause.

How SMBs Can Safeguard Against Phishing Attacks
May 22, 2017 - 6:03 PM
The reality is that phishing is one of the most effective cyber attack vectors used today, and SMBs are scrambling to figure out the best way to handle it. While user training is necessary, it's not sufficient. Each business has a diverse set of roles, which gives attackers a range of targets to gain access to company systems.

How to Make Big Data Analytics Efficient for Business Growth
May 19, 2017 - 9:10 AM
Big data analytics analyzes millions of data points to derive meaningful patterns and information that businesses could use. According to one study, at least one third of all data that is generated will pass through the cloud. IDC suggests that the total data generated at this point would be nearly 40 trillion gigabytes. Given this ocean of data to play with, how do businesses make use of technology to boost their growth? Here are a few ideas.

What Are the Biggest Threats and Priorities Facing the Banking Industry?
May 15, 2017 - 4:25 PM
It probably isn't news to anyone that the financial services industry is a major target when it comes to data breaches, accounting for 35 percent of all data breaches and weighing in as the No. 1 most breached industry, according to the Verizon 2016 Data Breach Investigation Report.

Here's Why Every Business Needs a File-Sharing Policy
May 11, 2017 - 4:27 PM
Sharing data, files, and other important information is a major part of today's digital business world. Between email, VoIP phone calls, cloud software programs, and everything else that your business needs on a daily basis, it's impossible to avoid the exchange of information. But if you don't have a secure strategy in place, you're just asking for trouble.

How is DevOps Adding Value to Business Productivity?
May 11, 2017 - 9:19 AM
In this article, we will discuss the benefits of DevOps for small and medium scale enterprises.

Netwrix Auditor 9.0 Offers Quick Response to Ransomware
May 11, 2017 - 8:45 AM
The release of the new Netwrix Auditor 9.0 addresses new security threats by introducing functionalities that will allow organizations to respond quickly to ransomware and insider vulnerabilities.

How to Future-proof Your Security Operations
May 10, 2017 - 4:48 PM
Security Operations Center (SOC) teams face anywhere from 50 to 100,000 threat alerts a day, many of which are false positives. Even the most sophisticated teams struggle to combat the sheer barrage of information and alerts they must sift through daily. Not only can alerts and events be hard to prioritize and manage, but real-time detection continues to be a major challenge as many sophisticated adversaries use "living off the land" techniques to blend in as insiders. One thing is clear - SOCs need to continue to evolve in order to keep pace with modern-day threats. And, utilizing the right combination of technology, intelligence, and people is critical to this evolution.

Studies Illustrate Growing Cybersecurity Threats
May 10, 2017 - 4:36 PM
A large and growing collection of headlines and reports remind us of the growing cybersecurity problem. Here's a look at a few statistics and forecasts from some of the latest studies on this front.

Security Platform vs. Security Fabric
May 9, 2017 - 10:44 AM
One of the challenges many organizations face when considering upgrading or expanding their security infrastructure is simply wading through the sometimes-confusing language and nomenclature being invented by security vendors and manufacturers to describe new technologies and strategies.

From the System of Record to the System of Intelligence
May 5, 2017 - 4:15 PM
The 1990s legacy vendors of ERP were long considered best in class, the cutting edge. But now organizations approach to ERP needs to evolve. Today, in the age of artificial intelligence and machine learning, organizations can do better than running a system of record. They can run a system of intelligence.

The First Step to Digitalization and Efficient Document Capture
May 3, 2017 - 4:22 PM
The goal of document imaging is to capture and share information visually, so clarity in all resulting formats is critical. What you capture is what you will wind up seeing, sending, and printing. Capturing reality (and possibly enhancing it without modifying it) is crucial.

Cyber Crime Alert! The Rise of Exploit Kits
May 3, 2017 - 12:05 PM
Cherif Sleiman, VP EMEA at Infoblox, discusses the increasing prevalence and risks posed by exploit kits, the evolution of this threat and how companies can defend against them.

The 5 Biggest Pain Points IT Pros Deal With
May 2, 2017 - 8:41 AM
It's a good time to be in the information technology field, but that doesn't mean the industry is void of issues. With new advancements come new issues that must be dealt with in a head-on fashion.

Tools and Resources That Will Aid in Business Growth
April 27, 2017 - 9:28 AM
While fast growing businesses have the potential to be tremendously lucrative, lacking the tools, technology and resources needed to deal with the specific complications and obstacles that expansion may create can quickly become a major liability.

Waze or MapQuest? When it Comes to the Internet, Traffic Routes Matter
April 26, 2017 - 4:39 PM
Let's say you operate a large chain of retail stores. Would you rather your customers use Waze or MapQuest to get to the store closest to them? Clearly you would rather they use Waze; otherwise they might find themselves stuck in traffic and decide in frustration not to go to your store at all. When it comes to online businesses, the situation for your customers is quite similar.

Study: Mid-Tier Businesses Need Security Services
April 26, 2017 - 11:14 AM
Mid-tier businesses are spending a large and growing amount of their budgets on security - especially network security, according to a new study conducted by 451 Research. And the study, which was commissioned by security-as-a-service provider OPAQ Networks, suggests that the majority of these companies want and need security as a service to help them manage this financial burden.

The Importance of Responsive Design for New Websites
April 25, 2017 - 2:37 PM
The usage of mobile phones has exploded in recent years. Most people now have a cell phone that they use for everything from calling to watching movies. These phones are an essential part of everyday life. Since they are so handy, people are using them more often to access the Internet, which has brought about some issues.

What's the Appropriate Response After a Security Breach?
April 24, 2017 - 10:06 AM
A security breach can be a nightmare for businesses of all sizes. And while there's a lot of information on how to avoid a breach in the first place, there isn't always clear advice on what to do after one has already happened. From an IT perspective, a swift and calculated response will play a key role in diffusing the problem and rebuilding trust.

Four Must-Haves for Your CPQ Software Upgrade
April 17, 2017 - 2:43 PM
Exactly what is CPQ software, and why do you have to upgrade it? Also known as configure price quote, it's a software solution for sales teams that quickly analyzes data to offer the best, most accurate numbers in seconds or minutes (depending on the amount of numbers to crunch). It's taken the place of sales teams going in the back to "talk to the manager" in an age when customers want and expect information in real-time. It also removes human error, encourages customer loyalty, and makes closing the deal a lot easier on your sales team.


Subscribe to InfoTECH Spotlight eNews

InfoTECH Spotlight eNews delivers the latest news impacting technology in the IT industry each week. Sign up to receive FREE breaking news today!
FREE eNewsletter

Information Technology Whitepapers