View Post

How Disrupters are Using aaS to Speed Up Digital Transformation

In Digital Transformation by Daniel NewmanLeave a Comment

You know what makes for an agile and efficient digital transformation? A commitment to using resources efficiently—including, most importantly, human capital. That’s why many companies are speeding up digital transformation with new technology models, including the booming as-a-Service (aaS) model. Flexible. Efficient. Affordable. The aaS model levels the playing field for big and small companies both, allowing them to experiment …

View Post

CyberSecurity—The Greatest Challenge CISOs Face Today

In Security by Shelly KramerLeave a Comment

What a time to be alive! The rapid advances of technology and dawn of an era dominated by the Internet of Things (IoT) has changed pretty much everything about life as we know it. Which is why it’s no surprise that cybersecurity is perhaps the greatest challenge CISOs face today. But let’s back up. Why is the IoT such a …

View Post

Developing an Enterprise IoT Security Framework

In IoT by Daniel NewmanLeave a Comment

When it comes to cyber security, one thing is clear: there’s never enough to go around. A few months back, I discussed the importance of creating a solid cybersecurity framework in helping combat cyber attacks and hacks within your company. Today I want to go a level deeper: creating an IoT security framework. Do I Really Need an IoT Security …

View Post

Are Sophisticated Cyber Crimes a Myth?

In Security by Daniel NewmanLeave a Comment

Short answer: yes. Although we’ve recently heard so much about sophisticated cyber crimes like those launched on a national scale—i.e. Russia—the truth is, most attacks are simple and home grown. In fact, unassuming employees make up the bulk of attacks happening today. That means companies need to change their perspective on how to protect themselves. Planning only for sophisticated cyber …

View Post

Employee Digital Device Practices Continue to Pose Security Risks

In Technology by Shelly KramerLeave a Comment

Cybercrimes are on the rise, and with the number and sophistication of attacks growing rapidly, it can feel as if the workplace is constantly under siege. Companies of all sizes, and across all industries, wonder how to protect themselves while maintaining compliance with federal regulations, and without disruption to their business. The 2015 Cyber Security Intelligence Index report from IBM found that 95 …

View Post

Creating Mobile Computing Experiences

In Mobility, Security by Daniel NewmanLeave a Comment

The advent of smartphones created the desire for full functionality that fits in the palm of your hand. Apps have become a mainstay of mobile technology, offering specialized functionality in an incredibly vast spectrum of customer desires and interests. Now, mobile technology is a lynchpin of modern business. Users don’t simply want a smartphone—they’re looking for mobile computing experiences. Experience …

View Post

Security Heightens as Hackers Target Mobile

In Mobility, Security by Daniel NewmanLeave a Comment

Many enterprises have taken to creating their own proprietary apps and software, and mobile devices are now a mainstay in modern business. Shadow IT isn’t the only concern accompanying the growth of mobile in the business world, however. As mobile technology becomes more popular and pervasive, hackers are turning their attention toward mobile devices. Understand Shadow IT in Modern Business …

View Post

Converting Shadow IT into Change Adoption

In CIO/IT by Daniel NewmanLeave a Comment

Fast-paced technological advances have inadvertently opened the door to increased risks from shadow IT. Cloud-based solutions have given non-IT professionals the opportunity to create and implement applications that expedite workflow. Without being able to control or secure these on-the-fly solutions, chief information officers (CIOs) may see the movement as a security threat. However, efforts to squash the rise of shadow …