Editors' Picks
-
Prescriptive analytics is coming to a future near you
It is only a matter of time before algorithms rule the world. Humans, meet prescriptive analytics.07 Aug 2013
-
Prescriptive analytics is coming to a future near you
It is only a matter of time before algorithms rule the world. Humans, meet prescriptive analytics.31 Jul 2013
-
IT consulting market outlook: It's growing, but slowly
While IT consulting market bellwether Accenture had a disappointing third quarter, the sector in general looks to be on a growth track.17 Jul 2013
-
GE, Pivotal and Amazon collaborate on the Internet of Things
GE, Amazon and Pivotal have put the Internet of Things into action to make machines smarter with implications for medicine, manufacturing and more.20 Jun 2013
-
Prepare for Shamoon malware with data backup and recovery plan
Expert Nick Lewis discusses how to detect Shamoon malware and emphasizes the importance of detailed data backup and recovery plans.19 Feb 2013
-
HR analytics early adopters say meaningful metrics, narratives are key
Identifying meaningful metrics and constructing data narratives are keys to success in HR analytics initiatives, speakers at an HCI conference say.12 Feb 2013
-
The story of five CIO entrepreneurs in India
Planning to start your own business? Let the story of these five Indian CIO entrepreneurs provide you with the inspiration you need.26 Nov 2012
More Like This
-
Global Procurement and Supply Chain Management for the Oil and Gas Industry Conference
June 3-5, 2013
Houston, TX
18 Apr 2013 -
Facebook's datacentre carbon footprint and greenhouse gas emissions rise
Despite its focus on energy efficiency and use of renewable energy resources, Facebook’s datacentre carbon footprint increased 52% in 201202 Aug 2013
-
IBM and Shell use data analytics to find more oil and gas
IBM and oil company Shell are collaborating on a research project to use predictive analytics to identify possible oil and gas reserves. Predictive...26 Feb 2010
-
IT security frameworks and standards: Choosing the right one
Expert Joe Granneman introduces several IT security frameworks and standards, and offers advice on choosing the right one for your organization.05 Sep 2013
-
Cybersecurity and global risk assessment enter the boardroom
Analysts expect security concerns to drive global risk management, but executives may need convincing.03 Sep 2013
-
The 2013 OWASP Top 10 list: What's changed and how to respond
Expert Michael Cobb highlights the changes made in the 2013 OWASP Top 10 list, including new vulnerabilities and what they mean for enterprises.10 Sep 2013
-
How does steganography work and does it threaten enterprise data?
Expert Joe Granneman explains how steganography works, and the ways it can both protect and threaten enterprise data.29 Aug 2013
-
Oil and gas sector generates big business for systems integrators
The oil and gas vertical is a fertile field for systems integrators specializing in custom ERP applications.21 Oct 2008
-
Identifying and locking down known Java security vulnerabilities
Expert Michael Cobb discusses why known Java security vulnerabilities are on so many endpoints and how to contain them -- without updating Java.08 Aug 2013
-
Advanced threat-detection products emerge: Benefits and challenges
Traditional security tools are no longer sufficient for defending against new breeds of attacks, forcing advanced threat-detection products to emerge.06 Aug 2013
-
A decade later: SOX program management best practices
After 11 years of Sarbanes-Oxley and other mandates, enterprises have finally embraced holistic compliance program management as a best practice.12 Sep 2013
-
Emerging threat detection techniques and products
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing problem, penetrating networks and stealing intelle...26 Jul 2013
-
Using a next-gen firewall to determine application access policies
Learn how next-gen firewalls offer improved application awareness and granularity to manage or block particular application features.11 Sep 2013
Security Management Strategies for the CIO