Quick Post
ksenie
The results of the fifth annual Cost of Cyber Crime study, conducted by the Ponemon Institute shows just how much cybercrime has spread from 2013 to 2014. Did y…
(1)
   
(3) (3)
Scott Reeves  Why email filtering is needed to combat malware. more »
sreeves
Michael Garrett
Software consumption models are changing. And as choice proliferates, enterprise IT needs to become a savvy consumer of these different models. Software as a se…
Would you like to comment on this content? Log in or Register
enadhan
Denver Broncos’ quarterback, Peyton Manning threw his record-breaking 509th touchdown against the San Francisco 49ers. A moment of glory for Manning who would h…
Would you like to comment on this content? Log in or Register
jdodge
This week, it Home Depot's credit cards. A few weeks ago, it's Target's. Is any of your financial information safe?
(1)
   
Joel Shore  One must assume that nothing is safe and play it from there. The credit card magnetic stripe has always been a joke, but… more »
JoelShore
terencengai
The days of putting in a service request and waiting three weeks to get what you want are over. For the business to keep its competitive edge, IT has to deliver…
(5)
   
(3) (3)
Terence Ngai  Great comment! I could not have agreed with you more, John. more »
terencengai
jpmellojr
jdodge
terencengai
jdodge
enadhan
After blogging about my personal experience with loss of access to data on my device, there have been some unrelated developments in the industry that mirror so…
(3)
   
(2) (2)
E.G. Nadhan  Thank you, John.I have posed your question as a comment on the DNS Filtering… more »
enadhan
jdodge
enadhan
deisner
According to the Global State of Information Security 2015, data breaches cost companies an average of $2.7 million each year. What's more, the total number of …
Would you like to comment on this content? Log in or Register
Network Activity