News

News

  • September 29, 2014 29 Sep'14

    Building vs. buying big data technologies to tackle business problems

    It's never been more vital to invest in products that can address today's complex business problems. In this recap, tweet chatters debate the pros and cons of building versus buying big data technologies.

  • September 26, 2014 26 Sep'14

    Bash shell bug puts enterprises in more peril than Heartbleed

    Enterprises beware of the Bash shell bug -- experts are calling it the most dangerous security flaw of the decade. Also in Searchlight: restaurant chain Jimmy John's falls prey to a data breach; Apple sells 10 million new iPhones and counting.

  • September 25, 2014 25 Sep'14

    Chief data officer's success hinges on CIO sponsorship

    Chief data officers from Nationwide Insurance, KeyBank and Seattle Children's Hospital reveal the pivotal role the CIO played in developing their positions.

  • September 19, 2014 19 Sep'14

    Apple privacy policy puts consumers before advertisers to ensure sales

    Apple's privacy policy eased user privacy concerns and laid the groundwork for Apple Pay, Apple Watch and health data. Also in Searchlight: former Home Depot workers say the company settled for low-level security; and are 'thinkables' on the horizon?

  • September 16, 2014 16 Sep'14

    Tech skills gap means adapt or leave your IT staff in the lurch

    Constant changes in the IT industry mean certain tech skills are falling by the wayside. In this tweet chat recap, find out which skills you should hone to move up the ranks.

  • Sponsored News

    • September 02, 2014 02 Sep'14

      The Perfect Storm in Cybersecurity: A 3-Step Plan to Maximize Protection

      The cyberthreat landscape is becoming more sophisticated and coordinated. According to the Symantec 2014 Internet Security Threat Report, 2013 was “The Year of the Mega Data Breach.”

    • August 29, 2014 29 Aug'14

      Frequently Asked Questions: Why You Need Multi-Layer Protection

      Viruses have given way to targeted attacks designed to exploit any and all vulnerabilities within an enterprise. Attacks can come from anywhere at any time, directed at your weakest points, including email accounts, commonly used websites, social media and mobile devices, among others.

    • August 28, 2014 28 Aug'14

      How to Enable Employee Productivity with Apps

      One of the key byproducts of IT consumerization and the bring-your-own-device trend is the increasing incidence and diversity of work applications for mobile devices. From document readers/editors to collaboration and communication apps, mobile users now have a wealth of software literally at their fingertips.

    • August 28, 2014 28 Aug'14

      5 Must-Haves for an Enterprise Mobility Management Solution

      Mobility has become an increasingly important part of how organizations not only deploy technology, but also do business. Trends such as bring your own device (BYOD), telecommuting, mobile application development and anywhere/anytime connectivity have redefined IT architectures and reshaped infrastructure decisions from the data center to the network’s edge. IT consumerization has altered the boundaries between work and personal use: Research indicates that 88% of people use smartphones for work while they are on personal time.

    View All Sponsored News
  • September 12, 2014 12 Sep'14

    Get the best of the tech talent crisis: Collaborate with the business

    Finding first-rate talent isn't solely the IT department's job -- and it shouldn't be. Learn how to work with the business to tackle the tech talent crisis.

  • September 12, 2014 12 Sep'14

    iPhone 6, Apple Watch start another mobile revolution in the enterprise

    The new iPhone 6 and iWatch force CIOs to up their mobile app game and steel themselves for the wearable wave. Also in Searchlight: Home Depot and Google's data breach troubles; Netflix protests the FCC's net neutrality proposal.

  • September 05, 2014 05 Sep'14

    Use Apple iCloud hack to sell employees on security culture

    Apple's much-hyped iCloud leak of celebrity photos is a golden opportunity for CIOs to sell security culture to employees, says a customer experience expert. Also in Searchlight: Home Depot suffers a breach; Samsung unveils a two-screen Galaxy Note.

  • September 04, 2014 04 Sep'14

    How to combat the tech talent shortage

    Finding a candidate with the right combination of skills to meet modern enterprise needs is no mean feat. In this tweet jam recap, get tips on how to develop a hiring strategy that can tackle today's tech talent shortage.

  • August 29, 2014 29 Aug'14

    What do the new Samsung, Ralph Lauren wearables augur for CIOs?

    When Samsung, Apple and Ralph Lauren jump on the wearables trend, can enterprise employees be far behind? Also in Searchlight: Dropbox toughs it out as Google, Amazon offer cloud on the cheap; Uber tricks Lyft and other rivals.

-ADS BY GOOGLE

SearchCompliance

SearchHealthIT

SearchCloudComputing

SearchMobileComputing

SearchDataCenter

Close