What Makes Computer Software Secure? February 23, 2017 - 2:48 PM During the planning stages of software development, it's important to think about all possbile security flaws and how you can come up with ways to protect your software. If you concentrate on the following points, then your software will be as secure as possible.
5 Ways to Attract Angel Investors for Your Tech Startup February 22, 2017 - 10:04 AM Angel investors typically cannot put up as much money as venture capital firms, but offer an incredible amount of intangible benefits to tech startups, such as one-on-one mentoring. Angel investors typically invest in people rather than ideas, and wish to build lifelong working relationships with serious professionals.
Teramind's New Feature Detects Insider Threats February 21, 2017 - 8:58 AM Teramind has announced a new patent pending intelligent session mining feature to help organizations identify insider threats and to expand its partner program by helping value added resellers (VAR) and managed service providers (MSPs) increase their bottom line.
You Can Now 3D Print Electrical Circuits February 14, 2017 - 2:03 PM A company called Nano Dimension recently announced that it has successfully printed 3D electrical circuits. The team was even able to embed electrical components inside the circuits, during the printing process. So, the circuits are totally usable.
A Love Letter to the Excel Spreadsheet February 14, 2017 - 7:00 AM Just in time for Valentine's Day, here's a little tribute to the business application we've all been devoted to for so long.
Market Consolidation: Who Are the Winners and Losers? February 13, 2017 - 9:41 AM It is common to see smaller companies in the IT market accept VC funding or get acquired by bigger players, and for many, it's the end goal. In the IT automation space alone, market consolidation has played out time after time - with behemoths such as CISCO, IBM, BMC and CA Technologies acquiring smaller, niche players. The latest of these announcements came in January 2017 when CA Technologies finalized its acquisition of Automic.
Here's Why Data Backup and Recovery Needs to be a Focal Point February 13, 2017 - 9:23 AM You may assume it'll never happen to you, but all it takes is one attack, natural disaster, or honest error and all your company's data could vanish. That's why you absolutely must have a backup and recovery plan in place.
3D Printing New Crimes: What Police Need to Know February 13, 2017 - 8:56 AM 3D printing has the potential to transform the world by simplifying manufacturing, shortening supply chains, democratizing production, creating jobs, and customizing products to our needs. But 3D printing also has a dark side. Guns have already been 3D printed and criminals are using 3D printers to create new forms of crime.
Empowering Higher Education to Empower Students February 9, 2017 - 9:01 AM Most higher education institutions seek to prepare their graduates to be "work ready", so it's no surprise that many of them have incorporated Linux-related content into their curricular programs. As the popularity of Linux in modern IT has grown, so has the demand for Linux and related skills in the job market. But building these courses so they match the expectations of enterprises, keeping them up-to-date as technology rapidly evolves, and properly supporting them with hands-on labs and exercises can be a complex, difficult, and costly undertaking. This is why we created the Red Hat Academy.
Password Integrity Shouldn't Be Taken Lightly February 7, 2017 - 9:52 AM For all the discussion about malware, phishing, ransomware, and other common threats, it seems like most IT departments around the country are failing to account for one of the more prevalent issues: password-based attacks.
Ransomware: How to Prepare for and Recover from Attacks February 2, 2017 - 11:58 AM Ransomware - a malicious program that infects and locks up files on devices until a ransom is paid - is a growing problem across all industries. Experts say the total cost of ransomware attacks could reach $1 billion in 2016, and the danger is expected to increase sharply in the years ahead. A recent Osterman Research survey of more than 500 IT professionals at businesses in North America and Europe found that almost half had been the target of a ransomware attack.
Data Breaches Are Costing Victims Big February 2, 2017 - 11:49 AM We all know some of the ancillary costs of data breaches. The loss of face in the community, the loss of faithful customers who no longer believe a company safe to work with, the loss of time spent repairing a system and augmenting it to face future breaches are all a part of the package.
Email Archiving Laws Are Changing - Are You Complying? February 1, 2017 - 11:54 AM Many industries are effected by laws regarding the archiving of digital documentation. Some industries only need to archive for a year, while others may need to archive everything for an entire lifetime. If you would like to learn how archiving laws effect your industry, take a look at this Guide to Email Retention Policy.
Data Management Platforms: Nailing the Implementation January 31, 2017 - 8:10 AM So now that you've acquired a data management platform (DMP), it's now time for you to set it up. A DMP implementation is a very iterative process, so you'll need to prepare in advance. Some components of the implementation may be complete before others, and that is perfectly normal. A successful implementation will be revisited and tweaked to ensure long-term relevance of the tool.
New Tool Uses AI to Improve Wedding Planning January 24, 2017 - 1:55 PM Wedding Nook automates the $58B wedding industry with an AI platform / formula that utilizes constantly collected data to best match users with a local vendor that meets their needs.
CoPilot Blames Malevolent Insider for 2015 Data Breach January 24, 2017 - 1:39 PM The company asserts that the data breach caused no personal or financial harm to any of the victims. The incident, however, is yet another reminder about the threat that malevolent insiders pose for cybersecurity.
Three Ways Companies Can Improve Sustainability January 24, 2017 - 10:00 AM All of the evidence points to the fact that pursuing sustainability is a savvy business decision; yet, despite there being a plethora of green business strategies out there, many companies either don't have a clear sustainability plan or lack any sort of policy altogether. Here are three easy ways companies can improve sustainability.
Top Five Incident Response Tools January 19, 2017 - 12:06 PM Until few years ago, incident response tools were much like police investigations - complex, time consuming, and requiring high expertise. While tools facilitated investigation and response activities, processes remained to a large degree manual. However, in recent years, a new generation of tools has emerged that significantly simplifies the life of security incident response teams.
E-Signature Adoption Takes Big Step Forward With New California Law January 18, 2017 - 10:11 AM Electronic signatures (e-signatures) have been around for a couple of decades, but significant barriers are just now being torn down in many industries and regions of the country. Most recently, a monumental barrier in the state of California was overtaken, thanks in large part to a bill signed by Governor Jerry Brown.
Data Corruption: The Silent Data Thief January 17, 2017 - 3:55 PM IT professionals are focused on the outside threats that might steal, encrypt or destroy their organization's data. But what about those serious threats that are not from external adversaries or rogue employees, which happen without you even knowing?
Making Mindfulness a Part of the Organization January 17, 2017 - 1:24 PM Mindfulness provides us with a framework for the betterment of both the individual and the organization. Simply aggregating a group of mindful individuals will not result in a mindful organization. It has to be accompanied by a systematic adoption of tools, techniques and processes, both physical and virtual.
SSL Inspection: Uncovering Cyber Threats in SSL Traffic January 17, 2017 - 9:01 AM Encrypted traffic accounts for a large and growing percentage of all network traffic. While the adoption of SSL, and its successor, Transport Layer Security (TLS), should be cause for celebration - as encryption improves confidentiality and message integrity - it also puts organizations at risk. This is because hackers can leverage encryption to conceal their exploits from security devices that do not inspect SSL traffic. How serious is the threat?
Combating Cybercrime in 2017 by Building an Information Security Program January 17, 2017 - 8:33 AM As far as we've come with information security, the landscape still feels like the Wild West. Swiftly reacting to intrusive foes may grant you the right to fight another day, but getting ahead of security risks warrants a proactive, strategic plan with structured management oversight.
Tips for Fighting Against Ransomware January 9, 2017 - 11:14 AM Hackers are now able to make money by blocking access to secured data from the organization's personnel using ransomware attacks. The hackers demand money from the organization for access to their own secured information from the server. In this type of attack, the hacker is safe and will likely not get caught for the illegal act.
How the Education Sector Must Prepare for the Digital Era January 9, 2017 - 10:39 AM The new generation approaching Higher Education is millennials, who have grown up with technology. Meanwhile, the children entering primary and secondary schools see technology as second nature. Now, more than ever, is the optimal time for the education sector as a whole to think about the infrastructure that supports the digital learning experience.
End-to-End Encryption a Recipe for Serenity January 5, 2017 - 3:13 PM Divatia, an application and performance optimization industry veteran, said Baffle is able to minimize performance impact, ensure encryption throughout the entire data lifecycle and automate the storage, rotation, retirement and use of keys. Too many firms view security as "a necessary evil…just a box to check," and in taking this nonchalant approach are providing opportunity for increased vulnerability.
The Value of Data Integration in Big Business December 28, 2016 - 3:32 PM For decades now, data analysts have closely studied the past in the hopes of understanding the present more clearly. With the power of data integration, they can stop hoping and start knowing. Data integration doesn't guess, data integration delivers answers.
Real-Time Big Data for Social Good December 28, 2016 - 12:02 PM There is no denying that Facebook, Google and even our phone companies collect a lot of information about each of us. The question is: can we leverage big data for the benefit of society and to improve the human condition?
Wrap-Up on 2017 Digital Trends December 27, 2016 - 3:25 PM In the run up to 2017, predictions on trends are overwhelming regardless of the field, channel or geo. Brands express concerns, producers put stakes, startups reap up the results, investors search for the top runners, while experts analyze and make foresights. In this context, the opinion of the latter is the least biased, hence, most valued.
IP Monitoring: How Deep Should You Go in Protecting Your Digital Assets? December 20, 2016 - 9:33 AM Digital piracy is continually rising, and bootlegged TV shows, songs and movies are only scratching the surface. For businesses, the bigger threat is the risk of their confidential data and assets falling into the wrong hands. Think Sony. Think State Department. Think Ashley Madison (and a whole lot of others).
IT Project Managers Use Big Data to Meet Deadlines December 14, 2016 - 2:20 PM Today's successful businesses are fully informed. They are aware of their target market and how customers interact with their products and services. As data analytics has become more readily available, brands have discovered the power of information. Armed with the right data, brands can create strategies that are guaranteed to get results.
SEO of Websites Developed Using Joomla Templates December 14, 2016 - 8:19 AM Joomla is a widely used CMS by business owners and marketers to custom develop their promotional and e-commerce websites. For whatever purpose you maintain a website, it is very important to ensure its search engine performance in order to make your site visible to the public.
SecBI CTO Talks Security, Telecom Predictions 2017 December 13, 2016 - 3:17 PM Emerging technologies based on machine learning and analytics are already having a huge impact on the industry. While this began to really sprout in 2016, there is still more to come.
Sonian CTO Talks ITEXPO December 12, 2016 - 9:53 AM Sometimes managing information can be difficult - even with everything now being digital. Big data can cause big problems if not handled correctly. Sonian, a pure public cloud information archiving and analytics company, realized this problem in 2007 and has been working to solve it ever since.
10 with A10: 10 Security Predictions for 2017 December 12, 2016 - 8:34 AM The cyber landscape changes dramatically year after year. If you blink, you may miss something; whether that's a noteworthy hack, a new attack vector or new solutions to protect your business. Sound cybersecurity means trying to stay one step ahead of threat actors.
Beyond the Holidays: How to Prioritize IT Projects for 2017 December 8, 2016 - 10:28 AM Prioritization of projects is an essential part of PMO value contribution. Unless your PMO has more resources than it knows what to do with, you likely have a higher demand than resources to complete them all.
DDoS Defense: Are Corporate Networks in the Middle East Protected? December 7, 2016 - 9:24 AM Distributed denial of service (DDoS) attacks are growing in both size and sophistication. Recently in September, a pair of high-profile DDoS attacks reached more than 600 Gbps and 1 Tbps, respectively, ranking among the largest DDoS attacks on record. And their ferocity is only expected to trend upward.
Bigger Walls Won't Keep Data Safe, Vectra Will December 6, 2016 - 7:46 AM For years, the security community placed a focus on perimeter defenses but ensuring all is well is much more than simply building a bigger wall. It's what these nefarious actors do once in the network that is the truly frightening part of the equation.
Three Ways to Automate Work On the Go December 5, 2016 - 11:04 AM The great work your teams are putting out is what will help move your business forward. If you're part of a growing company, that acceleration can be exciting: new customers, new projects and a brighter future. The downside is that growth often brings complexity.
Napatech CEO Talks Telecom Trends December 2, 2016 - 6:04 PM Here's what Napatech's CEO Henrik Brill Jensen had to say about what's happen in communications today, and what's expected for the future. Napatech sells solutions that address the challenges of getting the right data, at the right time, to the right place within the network management and cybersecurity arenas.
NFL Athletes as Metaphor for How to Get Business Accomplished December 2, 2016 - 8:27 AM It's no secret that file sizes are increasing along with the amount of data being generated today. Even the average website has doubled in size in the past three years. Data and files are getting larger, yet still must get from point A to point B in an expedited fashion. It can no longer be the big, slow data it once was, but enterprises still fail to fully embrace the agility component.
SMBs Buying IT at Fever Pitch December 1, 2016 - 9:23 AM A new report from the International Data Corporation projects that IT buying in the SMB market will clear $668 billion by 2020.
Analyzing the Benefits of a HyperFlex Architecture November 29, 2016 - 1:21 PM With the rapid pace of change when it comes to communications and networking, it may be necessary to upgrade your IT infrastructure. But figuring out just how to do that can be daunting.
Software Solutions: Are They Really What They Say They Are? November 29, 2016 - 9:38 AM Software and information technology solutions protect against known and traditional styles of cyberattacks, but they often do not anticipate new styles of attacks or new software tools that hackers use to perpetrate cybercrimes.
How to Conquer IT Challenges and Reach Big Data Potentials This Cyber Monday November 28, 2016 - 6:01 PM 'Tis the season; the time of year retailers deck their stores with the latest electronics, clothing and gifts galore. As stores promise the best prices of the year, a projected 137 million consumers will shop between Thanksgiving Day and Cyber Monday, according to the National Retail Federation.
Is a Secure Website Possible in 2017? November 28, 2016 - 9:52 AM If you spend much time studying cybersecurity trends, then you know how volatile things are out in cyberspace. But just how dangerous is it? And will it be possible to secure your website using information technology in 2017?
Ready for Cyber Monday? Stay Safe This Shopping Season November 23, 2016 - 12:05 PM We will soon be in the throes of the holiday gift-buying season. A whole set of must-have connected devices have hit the stores, from smart accessories and appliances to game consoles and online games to Web-enabled toys. And we will be buying many of them online, especially on Cyber Monday.
The Basics of WordPress Database Backup November 21, 2016 - 11:08 AM The information technology space is constantly coming up with new ways to make people's lives easier. Now, WP Database Backup, an integrated package of WordPress, enables users to create and restore backups the easier way.
Aria Systems: Monetization Solutions Address Today's Trends November 17, 2016 - 8:49 AM Monetization solutions from Aria Systems help the businesses that use them-including information technology departments- to offer their customers more choices in their products and services, and how and when to purchase and pay for them.
Preparing for a Software Audit - What Does it Really Entail? November 17, 2016 - 8:44 AM Set your information technology (IT) department up for success during your next software audit by asking yourself the right questions, implementing SAM and configuration management solutions that are right for your enterprise, and looking for ways to cuts costs from unnecessary spending.
SAP HANA to Get Some Great New Power with IBM Development November 10, 2016 - 2:00 PM Many companies put SAP HANA to work in driving some operations, but IBM is ready to put still more power into that platform by offering some new infrastructure choices to help drive it along. The new choices could mean big new options afoot, and may give IBM a further leg up in this market front.
Come Together: A Federated Approach to GRC and Risk Management November 9, 2016 - 11:40 AM Managing risk and maintaining compliance in the face of complexity and constant change is a major challenge for organizations, from the Board through to Management and even dedicated risk and IT professionals. Organizations, their business units and subsequent departments all have separate needs and diverse compliance standards that they need to meet, as well as exposure to differing third-party risks.
Why the New Monoliths are Good for Business November 8, 2016 - 2:23 PM For years, enterprises had to choose between monolithic enterprise apps and best-of-breed solutions. The former offers a one stop shop and integration, but force compromises. In the latter, individual programs may shine on their own but need to be cobbled together through duct tape, bubble gum and APIs.
How to Avoid Malware this Holiday Shopping Season November 7, 2016 - 10:36 AM The holiday shopping season delivers gifts to a wide range of recipients, including friends and family, the retail and shipping industries, and - increasingly - to hackers.
The Edge of the Network: Maximizing Availability November 7, 2016 - 8:29 AM We've all heard about fantastic new data center technologies, but all too often it looks like these technologies only seem to apply to the largest organizations with a wealth of centralized resources. Because data doesn't just live in the data center, we often face daily challenges when data is put to use in the field at remote offices and branch offices (ROBOs).
Lag Between Thoughts and Actions on Internet Security November 1, 2016 - 10:39 AM A recent study conducted by Arbor Networks revealed that Americans are very concerned about their security when using the Internet. Seventy-five percent of people who were surveyed reported that they were "concerned about their security, privacy, malware or websites tracking them."
Dyn, DDoS and Third Party Risk October 27, 2016 - 7:55 AM In the early 2000s, the once promising Internet bubble came crashing down, causing the economy to go into a tailspin and recession. At the time, many pundits analyzed this and thought that the Internet was just a fad and was not going to affect our everyday lives. However, what we have learned in the 15-16 years since the dot com bubble burst is that we as a society tend to overreact to these lessons and make dramatic interpretations of negative events.
The Data Challenge: How Businesses Can Best Obtain Actionable Insights October 25, 2016 - 3:15 PM Organizations are faced with many data challenges, though two specific issues are top-of-mind for businesses of all sizes. The first is the enormous growth of data sources, and how this has made obtaining a unified view that can inform meaningful insights increasingly difficult. The second obstacle stems from this challenge - a reliance on IT departments to pull, maintain and analyze large disparate data sets, which is costing businesses time and money they simply don't have in an always-on world.
Breaches Strengthen Case for Moving Beyond Passwords October 25, 2016 - 3:05 PM In late September, Yahoo revealed that state-sponsored cyberattacks compromised at least 500 million of its user accounts - the largest cybersecurity breach from a single site in history. The attacks prompted a renewed focus by the Obama administration on its fight against cybercrime that includes a new initiative and website called "Lock Down Your Login."
Three Electronic Devices Prone to Failure October 18, 2016 - 2:03 PM We rely on our electronic devices for an incredible amount of transactions and interactions, and when the device doesn't work properly it can be a jolt. With all of their complexity, electronic devices are still machines, and at some point machines break.
Managing Change in the Digital Era (Part 2) October 18, 2016 - 1:50 PM Many organizations are using value streams that help with prioritization. The value stream is the end-to -end process that helps you deliver business capability such as sales/marketing, HR, finance, logistics and call center. It provides visibility into what else is going on and all the processes involved.
Recurring Merchants: Are you Missing Out on Millions of Dollars? October 17, 2016 - 9:00 AM For recurring merchants who don't have a strategic chargeback management strategy in place, not preparing for the rising costs of chargebacks will likely cost them big - and the costs are only going to get worse. But there are ways to get ahead of the game and prevent future chargeback losses from occurring.
10 Questions to Ask Your Data Classification Provider October 17, 2016 - 8:38 AM Data classification enables your organization to discover, identify, protect and analyze your data. Properly classifying information not only creates efficiencies that save time and effort but increases the safety of organizational and customer data. As you evaluate different data classification solutions, this checklist of questions will help you determine which one will work best for your organization. It is divided into two topic areas: classification capabilities and infrastructure and deployment.
Managing the Chaos of Change: Getting Started (Part 1) October 14, 2016 - 8:22 AM The traditional portfolio management tool does not align with business today as well as it could because in some cases it's not responsive enough in this new agile environment and we are seeing some friction. The traditional approach is based around the annual budget planning - picking and funding projects - making it very operational and project focused. Projects that end up getting picked only have a tangential relationship to strategy.
Five Ways to Make Your Next Meeting More Productive and Engaging October 11, 2016 - 9:11 AM Though meetings are a necessary evil for nearly every industry, they consume a significant portion of the workday. According to the National Statistics Council, employees spend 37 percent of their time in meetings on average. Meetings often take time away from employees' projects and other priorities, cutting into productivity and sometimes delaying the completion of tasks. But perhaps more importantly, for organizations, employees' time spent in meetings can represent significant costs. So how can organizations flip the switch and make meetings more engaging and productive?
DRaaS- Taking the Cost and Complexity out of Cloud-based Disaster Recovery October 5, 2016 - 8:55 AM Downtime saps the energy from organizations. Every minute of lost productivity drains revenue. Meanwhile, competitors get a head start, when they should be left far behind. Availability of applications and data has a direct impact on its top and bottom-line performance for modern businesses. The result? There is absolutely no tolerance for downtime today.
The 10 Most Important Questions to Ask Your ADC Provider October 5, 2016 - 8:41 AM Is it time to refresh your application delivery controller? Maybe your current box is end-of-life or you're looking for more functionality or better price-per-performance? Or perhaps your application landscape has evolved and you're examining ADC providers to help optimize app delivery, or to bridge your cloud and traditional on-premises application environments. Here are the 10 most important questions to ask an ADC provider before you buy.
The Evolution of Big Data over the Last Five Years October 3, 2016 - 8:47 AM Vast amounts of data are being captured into massive data sets for analysis. Organizations are tapping this big data to obtain accurate models on trends, demographics, consumer patterns, and other insights regarding consumer behavior. Once something of a buzzword, big data has become a desirable advantage over the past five years. It's estimated that individual enterprise spending on big data now costs an average of $13.8 million yearly.
10 Things You Should Know About Ransomware September 29, 2016 - 4:00 PM As we predicted earlier this year, ransomware is a hot topic in the news these days, but what exactly is it and why should you care? In this article I will discuss the top 10 things you should know about ransomware, why it is becoming more prevalent, and, most importantly, what you can do to reduce your chances of becoming a victim of ransomware.
In the Market for Automation Software? Read This First September 29, 2016 - 8:27 AM "If you can't dazzle them with brilliance, baffle them with…" slick marketing. That seems to be the motto for the current crop of vendors offering business process automation. Prospects want what BPA has to offer, but three things make it difficult to choose a solution. Let's take a deep dive into each of them, as well as how buyers are canceling out the noise to adopt solutions that fulfill their needs.
Why Microservices Are Popular and How They Can Transform Your Development September 26, 2016 - 2:03 PM As application development has become more complex, developers are turning to microservices in increasing numbers. Traditional approaches to development cannot accommodate changes produced by the growth of cloud and mobile technologies, which has led to the birth and popularity of microservices. They act as strategic tools that forward-thinking organizations are using to meet dynamic business needs by modifying, scaling and updating their apps continuously.
Securing Today's Evolving IT Environments Requires Four Things September 26, 2016 - 9:34 AM Networks are evolving rapidly. The transformation to a digital business model has extended the network beyond the perimeter, which means that today's networks and their related security are becoming borderless. IoT and cloud solutions require organizations to worry about an attack surface that may not even be visible to IT. Worse, many IoT devices are headless, run simple communications protocols, and are unable to run a client or even be patched. Instead, they rely exclusively on the access layer for security.
Security Becomes a Bigger Priority in Blogging Industry September 26, 2016 - 9:21 AM As cyber attacks and threats increase, website security is becoming an even larger issue for businesses. And while bloggers tend to do their own thing and slip through the cracks, recent events have shown that even the smallest blogs need to take security seriously.
New Business Models Address Printer Security Concerns September 20, 2016 - 2:53 PM It's startling to think that the printer, the every-day office appliance we rely on so heavily, could be the gateway for a security breach that could bring an institution to its knees, but that's precisely what's been happening. The integration of printers into increasingly sophisticated document management workflows makes them a critically important, yet often-overlooked link in a corporation's global security chain, if the right measures are not taken.
ServiceNow Certifies Xangati ESP App September 20, 2016 - 2:01 PM Xangati helps businesses take control of their virtual data centers. Its Xangati ESP software scans virtualized data centers and hybrid clouds to identify performance issues and automatically take action to resolve such issues.
Don't Let Your Legacy ITSM System Stymie Your Digitalization Push September 20, 2016 - 10:19 AM Today, companies are embarking on broad-reaching digital transformation strategies, using technology to change the way people work, communicate and interact with customers. We call this approach digitilzation. Digitilization is helping organizations make more informed decisions, accelerate the development of new products and services, transform their supply chains and gain deep insights into their customer's needs. As enterprises continue to execute on their digital strategy, they are asking IT to provide more services. All these services need to be delivered and managed effectively.
How to Make Digital Transformation Grow Your Business September 20, 2016 - 9:05 AM What is it like to trim the sails to the winds of digital transformation today? Well, it is more than building a solid strategy with a carefully elaborated plan to go digital. On the contrary, a winning digital transformation strategy today is more liquid than ever.
Hidden Lessons of Incident Management September 15, 2016 - 1:05 PM One of the most common early goals of implementing DevOps best practices is a deep understanding of your systems in a stable state. However, this objective is not a "one and done" effort. It is important to continuously circle back in some form as changes are introduced. It's an ongoing exercise for an entire organization as processes, tools and teams improve continuously over time.
Companies Have a False Sense of Cyber Security September 13, 2016 - 1:31 PM It's one of the great classic films of our time, "Monty Python and the Holy Grail." In it, a character known as the Black Knight takes repeated blows from King Arthur's sword, only to protest that the dismembering blows taken are merely "flesh wounds," even to the point where the Black Knight is a torso on the ground. Companies in a recent Juniper Research report are behaving similarly to that oblivious knight, as defined by recent numbers about the state of their cyber security.
Why Three Sandboxes Are Better than One September 12, 2016 - 8:31 AM Today's companies are hyper-aware of the importance of security, conditioned by years of disastrous, high-profile data breaches in the news. Still, because of the heightened awareness among corporate IT departments, it's rare that a business gets breached due to a total absence of security systems. More often, it's small holes in their security programs that lead to data compromise.
Intel to Spin off McAffee in $4.2B Deal with TPG September 9, 2016 - 2:43 PM While revenue for Intel Security was up 11 percent year over year for the first half of 2016, according to Business Insider, combining McAffee and Intel was probably not a great idea in the first place given the two companies have very different models and processes, and in light of the fact that Intel effectively halved the value of the company since it bought it.