OPM Breach Leads To New Systems, Procedures
The Obama Administration announced changes to the Office of Personnel Management designed to ameliorate the flawed systems and processes that led to a massive data breach in late 2014. The plans -- and the steps taken to get there -- hold lessons for any IT organization.
Ban The Box: What It Means For Your IT Hiring Practices
A movement known as Ban The Box aims to have questions about criminal convictions removed from employment applications. The effort has led to regulations in 19 states and more than 100 cities and counties. Here's what you need to know.
10 Stupid Moves That Threaten Your Company's Security
As you walk through the door of your company each morning, you are potentially poised to be the weakest link in your organization's defense against hackers and malicious attackers. Here are the 10 boneheaded moves you make -- often without realizing the security risk.
Encryption Vs. Privacy Battles Rage From Davos To US
The debate over efforts to protect users' privacy and encryption versus governments' efforts to fight terrorism was a major focus at the World Economic Forum in Davos this week. Meanwhile, battles over the same issue are emerging in the US from New York to California on the legislative level.
IT Infrastructure Trends: 5 Worth Watching
Any infrastructure projects that can either cut costs or improve data protection should be tops on your list. Here, we look at five infrastructure trends that will help CIOs determine the best places to invest their budget dollars wisely in the next 12 months.
Microsoft R Updates, IBM's Fraud-Detection Analytics Buy: Big Data Roundup
In our big data roundup for the past week, we've got news from Microsoft about what it's been doing with statistical modeling language R, IBM's acquisition of a real-time fraud analytics company, Baidu's donation of some machine learning efforts to open source, and a management shakeup at Apache Spark company Databricks.
Cisco Fighting Shadow IT With New Cloud Service
Cisco has launched a service, called Cloud Consumption Services, that sniffs out surreptitious cloud users practicing shadow IT. The service also analyzes the risk and helps IT manage use.
4 Data Security Tips For CIOs
Security challenges facing CIOs will continue to escalate because the payoffs are high for perpetrators, and risks are relatively low. Here are four tips to help turn your organization -- and your data -- into less appealing targets for the bad guys.
Mobile, IoT Sales Hampered By Security Fears: Accenture
Concerns about privacy and security join several factors weighing heavily on purchases of mobile devices and Internet of Things (IoT) technology. A new Accenture report says 2016 could be a very flat year for sales of consumer technology overall, and mobile and IoT devices in particular.
Government IT: Hot Tech Trends In 2016
Local, state, and federal governments are aiming to make their tech initiatives more open, responsive, technically up-to-date, and secure this year. Can they pull it off?
Top Data Privacy Issues To Scare You In 2016
In 2016 issues regarding privacy, whether in personal or business data, are going to dominate headlines and change the way people interact with technology and the companies that provide it. From encryption to drones, to personal information, here's what to watch in the next 12 months.
DOJ Sues VW Over Emissions-Cheating Scandal
Volkswagen and its subsidiaries Audi and Porsche used "defeat devices" to make polluting vehicles appear to meet clean air regulations, the US Department of Justice claims.
Encryption Debate: 8 Things CIOs Should Know
Governments want access to encrypted communications to prevent terrorist attacks, but IT professionals and tech vendors say any weakening of encryption is a threat to privacy and data security.
Top Programming Language In Demand, Love Actually Analyzed: Big Data Roundup
While much of the world might have been busy digesting the Roast Beast, big data land this week saw the benchmarking of streaming technologies, the language that's edging out Java as the top one for beginning programmers, a new way to understand a modern classic holiday movie using statistical tools, and more.
How To Survive A Software Licensing Audit
Enterprise IT organizations face software audits as a matter of doing business with large technology vendors. What's the best approach to dealing with them? Here's a look at what you should and shouldn't do when you get that software licensing audit notice.