By: Dwayne Melancon   Now that things are settling down after Heartbleed, I think about some of the conversations I’v...
  Most businesses have routine occasion to discard confidential data about their business operations or personal client information ac...
Data security management continues to be a top business challenge for CIOs, CTOs, and Senior IT professionals in small, medium, and large bu...
The early Wi-Fi standards that opened the world's eyes to wire-free networking are now holding back the newer, faster protocols that followe...
According to new security based survey from Kaspersky Lab, nearly 200,000 new malicious software programs appear around the world each day. ...
By Allan Pratt   This post is not meant to be a primer on data breach protocols, but instead, is intended to raise the issue, create ...
  CA Technologies and the Ponemon Institute recently conducted study titled “Security of Cloud Computing Users 2013.” This ...
First it was copyright and patent infringement, now the White House warned China and other countries there will be trade and diplomatic acti...
The Global nonprofit IT association ISACA recently issued guidance on managing three top tech trends for CIOs and their organizations in 201...
In a previous post, I wrote about some things that were interesting from a very neat conversation with a healthcare CISO.  This post is...



White Papers

Buy Ads Directly on myITview