Premium Government Content
-
Life Imitating Art: Understanding The Dangers Of XSS Attacks
6/17/2016
Cross-site scripting, or XSS, is a vulnerability so common that not only is it number three on the OWASP top 10, but it also just become a real-life storyline related to the popular hacking TV drama Mr. Robot. When the USA Network launched the website promoting season two of Mr. Robot, a white hat hacker also immediately uncovered an XSS vulnerability that would have allowed an attacker to gather users’ Facebook information.
-
Reducing The Threat Of Stolen And Compromised Credentials
6/1/2016
Compromised and stolen credentials continue to be a thorn in the life of the health IT security professional. A recent Cloud Security Alliance survey found more than 65 percent of respondents believed compromised credentials would be the root cause of a security breach.
-
The Network Is Your Headphone Cord
5/4/2016
Music is rapidly completing its astonishing transformation from a physical thing you have and hold to an ephemeral service experience. Streaming music revenue increased 45 percent in 2015 and now makes up nearly half of the world’s digital music revenue, according to the International Federation of the Phonographic Industry’s annual report.
-
Is Big Data The New Gold Standard For Call Centers?
4/12/2016
It seems Big Data and analytics are stealing headlines day after day. Although they have become quite the buzzwords as of late, call centers around the world are finding Big Data and analytics to be somewhat elusive. Why? Because when a company adopts a new service, it usually requires an initial definition of what success or efficiency means. This definition becomes the gold standard of baseline metrics. The one factor that seems to hold call centers back from leveraging this useful business tool is quite simply — change.
-
Data Protection Without Borders
3/18/2016
Data sovereignty has garnered a lot of press and discussion over the last few months. But ask data owners, data creators, and those who process data what data sovereignty truly means and you will probably get many unique answers.
-
Regulatory Tug-Of-War And The Rise Of The Hybrid Cloud
3/15/2016
The tug-of-war between regulatory compliance and operational efficiency is causing companies to turn to the “hybrid cloud” for their business applications. Companies want the benefits of the cloud but need to control confidential customer data. This is particularly true in the financial sector, where security regulations often require that sensitive customer data remain in a company’s local country.
-
How IT Resilience Has Become An Effective Cost-Cutter For State Governments
3/10/2016
They say you have to spend money to make money, but having to spend money to save money is oftentimes equally true. In a paper published by Management Science — Do CIO IT Budgets Explain Bigger or Smaller Governments? Theory and Evidence from U.S. State Governments — researchers were able to demonstrate this fact as it relates to government spending on IT. According to the study, “It is estimated that on average, a $1 increase in state CIO budgets is associated with a reduction of as much as $3.49 in state overall expenditures.”
-
Why Aren’t Organizations Paying More Attention To Governance?
3/10/2016
In the last 10 years, we have seen a major growth in data, which is now created, captured and shared at an unprecedented level. That has created a tsunami of information for organizations to filter, analyze and store.
-
What Can IT Providers Do To Help Combat The Human Component Of Data Security Vulnerabilities?
2/29/2016
IT providers have a responsibility to do everything feasible to assure the success of their customers. Hard drives do fail and tornados do occur; however, with surprising frequency, more threats are occurring as a result of fellow human beings.
-
The Top 7 Benefits Of Building Situational Awareness In Safe Cities
2/3/2016
Safe city initiatives help cities achieve true situational awareness — both in routine times and during emergency situations — by aggregating a large amount of data and turning it into actionable intelligence.