When an affinity for data gets in the way of keeping data safe, decision makers dampen the progress IoT can offer. Here are two ways they can change that.
Simply relying on building security or network security may not be enough to protect your printers from being compromised.
Data clearing from mobile devices is a contested security measure. Let’s debunk some myths surrounding data clearing.
The Center for Data Innovation lists Massachusetts as the most data-driven state after ranking states based on 25 key indicators.
Today’s CIO understands the delicate balance between managing for today’s demands and preparing for the technology solutions of tomorrow. TriCore Solutions, a managed infrastructure and IT support company, recently conducted a study to learn how IT professionals are preparing for the future, and dealing with the present. The study is based on survey results from […]
More than ever before, CIOs and IT departments around the world are becoming more and more concerned with the concept of Shadow IT (also known as Stealth IT), including the amount of data stored in third-party cloud environments. Consider how many known software subscriptions your own organization manages. If you’re like most enterprise companies, that […]
If you’ve been on the internet in the past few weeks you’ve heard about the large scale cyberattack on DNS provider Dyn. On October 21, major websites including Twitter, Amazon, Spotify, Reddit, PayPal, Airbnb, Wired, Pinterest, and more experienced outages. The common thread? Each of these sites used Dyn as their upstream DNS provider. A […]
Here are some hard truths. The Internet of Things is coming to business. You’re going to need to adopt it in some fashion if you want to survive. When you do, your network will be more susceptible to being hacked than ever. At last week’s Internet of Things Security Summit in Boston, professionals from all […]
TechDecisions sat down with John Irwin, Senior Vice President of Government, Education and Healthcare at AT&T, to talk about cyber security considerations for colleges and universities: TD: Why would someone want to steal data from a college or university? JI: If you think about colleges and universities, they host a large amounts of student and […]
“Who here has read Flatland?” asks Andrew Milne, Ph.D., the CEO of Tidebreak. The novella takes place in a two-dimensional world wherein the inhabitants tell each other apart by making contact and discovering the shape of those around them. The main character, a square, one day comes across a circle. That circle then shrinks and […]