Corporate

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Fusce augue justo, viverra at luctus vitae, dapibus eu odio. Morbi vestibulum orci neque, vulputate pharetra purus fringilla in.

Cybercrime Up and More Complicated to Resolve
Cybercrime Up and More Complicated to Resolve

According to the 2013 Cost of Cyber Crime Study conducted by the Ponemon Institute on behalf of HP, the cost, frequency and time to resolve cyber attacks is all on the rise for the 4th year in a row. According to the study, which will release the findings in full later this month, the average annualized cost of cybercrime per organization incurred by the sample group in the US...

READ MORE
Key Attributes of an Effective CAO
Key Attributes of an Effective CAO

I recently wrote an article for Corporate Compliance Insights on “What Every Corporate Audit Officer Should Comply With,” looking at the key responsibilities a CAO plays in many corporate and healthcare organizations. With privacy and compliance laws expanding, the need for transparency is increasing and how organizations use and share private information is evolving. The role of a Chief Audit Officer (CAO) is an essential one, holding key responsibilities...

READ MORE
Gartner's Top Technology Trends for 2014
Gartner's Top Technology Trends for 2014

As we enter the last quarter of 2013, many analysts will begin putting together summaries of the past year and predictions for what’s to come in 2014. Last year, experts chimed in with their 2013 predictions, and it’s always interesting to see how many of these predictions were right as well as what surprises came up during the year. Experts couldn’t have predicted, for example, the revelation by Edward Snowden...

READ MORE
Data Security: Is the Endpoint Safer than the Cloud?
Data Security: Is the Endpoint Safer than the Cloud?

Former security contractor and former CIA and NSA employee Edward Snowden recently leaked secret documents revealing that the National Security Agency (NSA) in the US has been working with technology companies to weaken encryption standards and has been using programs to intercept telephone metadata and surveil the Internet. While discussions could be had on topics such as whistle blowing, surveillance, government secrecy and national security, the key takeaway for businesses...

READ MORE
Supporting iOS7 in the Enterprise
Supporting iOS7 in the Enterprise

September 18, 2013 marks the official release of Apple’s iOS7; if your enterprise supports iOS devices (iPhones, iPads), whether corporate-owned or BYOD, IT needs to be prepared for effectively rolling out iOS7. I spoke with Tech Republic about 7 Tips for Supporting iOS7 in the Enterprise. Detailed in full on Tech Republic, these 7 tips include: Use Apple IDs for BYOD, allowing enterprise the ability to purchase business apps through...

READ MORE