Premium Government Content

  1. Why The Time Is Right For The Global Telecom Industry To Engage MSPs
    6/28/2016

    According to Garter’s 2016 CIO Agenda Survey, CIOs expect digital revenues to grow from 16 to 37 percent in the next five years, and public-sector CIOs predict a rise from 42 to 77 percent in digital processes. What this means is — with very few exceptions — businesses of all types are feeling the impact of consumer demand for digital services, and are looking to digital to extend the way their business interacts with its consumers.

  2. Cyber-Security’s Weakest Link: People
    6/27/2016

    A stark reality facing today’s businesses is the never-ending threat to cyber-security and a strategy for how to combat it. An even greater concern is damage to corporate image, consumer trust, loss of revenue, liability to customers, and the ever-increasing statutes imposed by lawmakers and agencies who point the finger at businesses for failure to take responsibility for preventing data theft.

  3. Exploiting Windows Vulnerabilities Shows No Sign Of Slowing: The 6 Major Threats To Watch
    6/24/2016

    Recently, I wrote about the continuing threat Windows users face. Despite the major advances Microsoft has made in terms of increased security safeguards available in the latest release, Windows 10, there are millions of PCs still running older versions of the popular operating system which are highly vulnerable and susceptible to external threats. Of the many flavors of Windows still widely used, Windows 7 remains the most popular version of the operating system and where cyber criminals continue to focus much of their efforts.

  4. 4 Ways To Deal With Cybersecurity Risks
    6/21/2016

    Web application security is a very hot topic these days. So what do CISOs need to know in order to deal with related risks?

  5. Life Imitating Art: Understanding The Dangers Of XSS Attacks
    6/17/2016
    Cross-site scripting, or XSS, is a vulnerability so common that not only is it number three on the OWASP top 10, but it also just become a real-life storyline related to the popular hacking TV drama Mr. Robot. When the USA Network launched the website promoting season two of Mr. Robot, a white hat hacker also immediately uncovered an XSS vulnerability that would have allowed an attacker to gather users’ Facebook information.
  6. Reducing The Threat Of Stolen And Compromised Credentials
    6/1/2016

    Compromised and stolen credentials continue to be a thorn in the life of the health IT security professional. A recent Cloud Security Alliance survey found more than 65 percent of respondents believed compromised credentials would be the root cause of a security breach.

  7. The Network Is Your Headphone Cord
    5/4/2016

    Music is rapidly completing its astonishing transformation from a physical thing you have and hold to an ephemeral service experience. Streaming music revenue increased 45 percent in 2015 and now makes up nearly half of the world’s digital music revenue, according to the International Federation of the Phonographic Industry’s annual report.

  8. Is Big Data The New Gold Standard For Call Centers?
    4/12/2016

    It seems Big Data and analytics are stealing headlines day after day. Although they have become quite the buzzwords as of late, call centers around the world are finding Big Data and analytics to be somewhat elusive. Why? Because when a company adopts a new service, it usually requires an initial definition of what success or efficiency means. This definition becomes the gold standard of baseline metrics. The one factor that seems to hold call centers back from leveraging this useful business tool is quite simply — change.

  9. Data Protection Without Borders
    3/18/2016

    Data sovereignty has garnered a lot of press and discussion over the last few months. But ask data owners, data creators, and those who process data what data sovereignty truly means and you will probably get many unique answers.

  10. Regulatory Tug-Of-War And The Rise Of The Hybrid Cloud
    3/15/2016

    The tug-of-war between regulatory compliance and operational efficiency is causing companies to turn to the “hybrid cloud” for their business applications. Companies want the benefits of the cloud but need to control confidential customer data. This is particularly true in the financial sector, where security regulations often require that sensitive customer data remain in a company’s local country.