Premium Government Content
-
Cyber-threats In 2016: Evolution, Potential, And Overcoming Them
6/29/2016
The contemporary business environment is essentially a small subsystem in the larger cyber world. Every enterprise, no matter how technically progressive or apprehensive about technology, is connected to and handles different streams of data. The current IT landscape is highly disruptive, but it does promise better business outcomes for those who are Internet of Things (IoT) ready and prepared to embrace Big Data. However, there are some apprehensions about this more connected, omnipresent, and easily accessible data — it opens many doors to hackers, creating room for Cyber threats to seep in.
-
Why The Time Is Right For The Global Telecom Industry To Engage MSPs
6/28/2016
According to Gartner’s 2016 CIO Agenda Survey, CIOs expect digital revenues to grow from 16 to 37 percent in the next five years, and public-sector CIOs predict a rise from 42 to 77 percent in digital processes. What this means is — with very few exceptions — businesses of all types are feeling the impact of consumer demand for digital services, and are looking to digital to extend the way their business interacts with its consumers.
-
Cyber-Security's Weakest Link: People
6/27/2016
A stark reality facing today’s businesses is the never-ending threat to cyber-security and a strategy for how to combat it. An even greater concern is damage to corporate image, consumer trust, loss of revenue, liability to customers, and the ever-increasing statutes imposed by lawmakers and agencies who point the finger at businesses for failure to take responsibility for preventing data theft.
-
Exploiting Windows Vulnerabilities Shows No Sign Of Slowing: The 6 Major Threats To Watch
6/24/2016
Recently, I wrote about the continuing threat Windows users face. Despite the major advances Microsoft has made in terms of increased security safeguards available in the latest release, Windows 10, there are millions of PCs still running older versions of the popular operating system which are highly vulnerable and susceptible to external threats. Of the many flavors of Windows still widely used, Windows 7 remains the most popular version of the operating system and where cyber criminals continue to focus much of their efforts.
-
4 Ways To Deal With Cybersecurity Risks
6/21/2016
Web application security is a very hot topic these days. So what do CISOs need to know in order to deal with related risks?
-
Life Imitating Art: Understanding The Dangers Of XSS Attacks
6/17/2016
Cross-site scripting, or XSS, is a vulnerability so common that not only is it number three on the OWASP top 10, but it also just become a real-life storyline related to the popular hacking TV drama Mr. Robot. When the USA Network launched the website promoting season two of Mr. Robot, a white hat hacker also immediately uncovered an XSS vulnerability that would have allowed an attacker to gather users’ Facebook information.
-
Reducing The Threat Of Stolen And Compromised Credentials
6/1/2016
Compromised and stolen credentials continue to be a thorn in the life of the health IT security professional. A recent Cloud Security Alliance survey found more than 65 percent of respondents believed compromised credentials would be the root cause of a security breach.
-
The Network Is Your Headphone Cord
5/4/2016
Music is rapidly completing its astonishing transformation from a physical thing you have and hold to an ephemeral service experience. Streaming music revenue increased 45 percent in 2015 and now makes up nearly half of the world’s digital music revenue, according to the International Federation of the Phonographic Industry’s annual report.
-
Is Big Data The New Gold Standard For Call Centers?
4/12/2016
It seems Big Data and analytics are stealing headlines day after day. Although they have become quite the buzzwords as of late, call centers around the world are finding Big Data and analytics to be somewhat elusive. Why? Because when a company adopts a new service, it usually requires an initial definition of what success or efficiency means. This definition becomes the gold standard of baseline metrics. The one factor that seems to hold call centers back from leveraging this useful business tool is quite simply — change.
-
Data Protection Without Borders
3/18/2016
Data sovereignty has garnered a lot of press and discussion over the last few months. But ask data owners, data creators, and those who process data what data sovereignty truly means and you will probably get many unique answers.