Computer, network, and data security.

Understanding the emerging world of ‘fake everything’ is vital for figuring out what you and your company can do about it.

,
Mike Elgan (Computerworld (US))30 September, 2017 21:00 Credit: Michael Kan / IDG "Information wants to be free." That was the motto of truth-seeking digital activists in the '80s and '90s. The motto today is: "Information…

Is your digital transformation mobile-first? It should be

, ,
By Galen Gruman Executive Editor, CIO | APR 23, 2018 3:00 AM PT Your mobile strategy — both for internal use and in support of your customers — is a bellwether of your approach to digital transformation.…

How to Know Whether IoT Devices Are Safe

Samuel Greengard Added to IoTplaybook or last updated on: 04/17/2018 It’s no news flash that Internet of Things (IoT) vendors, in a rush to get products to market, don’t always focus on security. In recent years,…
future of work

6 Ways the Workplace Will Change in the Next 10 Years

, , , ,
December 15, 2017 Contributor: Sharon George HUMAN RESOURCE For heads of HR, the ability to peer into the future will make work infinitely easier. Current trends in business and technology show…
Disaster recovery

What is disaster recovery and how can this benefit your business?

,
Businesses face disaster every second of every day. Malicious actors could be preparing to hack their online platform, strong winds could leave them without power, or employee negligence may result in customer data falling into the wrong…
technology trends

Top technology trends for 2018

, , , , ,
It is that time of the year again and 2017 is over before we knew it. The Year of Intelligencebrought us a lot of progress and change; from over-hyped ICO’s to algorithms that created secret languages. As every year since 2012, I provide…

Protect Your Organization From Cyber and Ransomware Attacks

February 14, 2018 Contributor: Laurence Goasduff SECURITY Patching and removing web server vulnerabilities will improve enterprise security through 2021. Alison, chief information security officer at…

How to Manage Your Reputation in the Wake of a Cybersecurity Incident

,
After a cyber attack, customer and partner interactions can determine whether a company survives. by Eden Gillott Bowe Twitter Eden Gillott Bowe, president of reputation management firm Gillott Communications,…

Why developing an internal cybersecurity culture is essential for organizations

,
 Help Net Security     February 7, 2018 [Free CISSP Exam Study Guide] Get expert advice that will help you pass the CISSP exam: sample questions, summaries of all 8 CISSP domains and more! ENISA published a report providing…

How to print anything, anyplace, anytime, on any network.

, , ,
https://www.youtube.com/watch?v=_TfuwXObC0I&index=2&list=PLsX3eJ1gB1_A1-V0tNpnSbqQwf6BqL2Fbv%3D_TfuwXObC0I&index=2&list=PLsX3eJ1gB1_A1-V0tNpnSbqQwf6BqL2Fb&utm_source=socialondemand.external.xerox.com&utm_medium=Xerox…