It’s 10 o'clock – do you know what your IT security team is doing?
While it may be obvious that addressing vulnerabilities eats up the most time for IT security pros, what may surprise you is the source of those vulnerabilities.
While it may be obvious that addressing vulnerabilities eats up the most time for IT security pros, what may surprise you is the source of those vulnerabilities.
While students in K-12 classrooms are building robots in their makerspaces, IT professionals are building the infrastructure needed to keep up with the latest technologies in the 21st century classroom.
The 22nd annual education technology conference, Campus Technology 2015, took place in Boston the last week of July. It brought together some of the most influential leaders in technology for higher education and offered innovative solutions to the myriad of challenges for IT professionals, faculty, staff and students.
Though enterprises were once tentative about using so-called bug bounty programs to detect vulnerabilities, researchers are proving to be effective and trustworthy partners in assessing security risks.
LAS VEGAS – Telesign, a mobile identity solutions provider, continued to educate the public about its free "Turn It On" Campaign – a step-by-step instructional guide to two-factor authentication (2FA) on some of the most visited websites – at this year's Black Hat security conference. Co-founder Ryan Disraeli says that based on Telesign's "Consumer Account Security Report," it's clear consumers want more security but don't know much – if anything – about 2FA.
Cybersecurity has long been one of the main issues keeping CIOs awake at night. Now, with the number of high-profile cyberattacks seeming to increase each month, security is haunting IT leaders during the daytime, too.
Whether the goal is to attract new talent, retain highly qualified employees or develop an internal path to leadership, companies looking to create educational or coaching programs can either go it alone or, like most business processes these days, outsource part or all of the training function to a third-party.
Parents have plenty of things to worry about when they send their kids off to college: money, physical safety, their happiness, empty-nest syndrome, their future. Do they now have to worry about identity theft and data security, too?
We've all done it. Sworn to stay completely uncoupled from the office during a vacation, only to check email and get drawn into a work issue -- going from relaxed to tensed up in minutes.
Reconfiguring infrastructures, transitioning to the cloud and cross-training staff are some measures that CIOs and other tech executives have taken to reduce stress in the IT department and improve the business in general.