View Post

#SMACtalk 80: The Failures and Successes of Enterprise Software with Pega CEO Alan Trefler

In SMACtalk by Daniel NewmanLeave a Comment

In this week’s episode of SMACtalk, hosts Brian Fanzo and Daniel Newman had the opportunity to speak with Pega CEO, Alan Trefler. Known for his “Pull no punches” approach to business, Alan makes for the perfect “SMAC” guest because he’s going to take questions head on and leave the audience wanting more. At Pegaworld, we found out that Mr. Trefler isn’t only the CEO at Pega, he is also a chess master …

View Post

HIPAA Security and Awareness Training: An Integral Part of the Compliance Strategy

In Security by Kirk WrightLeave a Comment

When it comes to implementing a robust security protocol, employee training is one of the most critical—and often overlooked—aspects of a solid plan. Security and awareness training is also an integral part of HIPAA compliance.  But, according to a recent HealthITSecurity.com review of NueMD’s 2016 HIPAA Survey Update: “Healthcare organizations are also falling behind on annual HIPAA training. Currently, 58 …

View Post

Cybersecurity Insights from 2016 Security Breaches

In Security by Daniel Newman1 Comment

In 2016, more than 2 billion records were reported stolen in breaches that occurred the same year and just-discovered breaches from the past. The Identity Theft Resource Center recorded 980 breaches during the calendar year, accounting for millions of stolen high-value records (including Social Security numbers, driver’s license numbers, medical, and financial information). These increasingly common incidences offer valuable cybersecurity …

View Post

To Have and to Hold: Married to the Internet of Things

In IoT by GuestLeave a Comment

For several years we have been carefully observing the evolution of the Internet of Things (IoT). For those not familiar with the term, it refers to the connectivity of virtually every modern “smart” device that is being manufactured for the home, office, automobile … you name it. If it has a “chip” and can access Internet, then it is at …

View Post

Samsung Knox May Be The Hero for Mobile Device Management

In Mobility by GuestLeave a Comment

This post is sponsored by Samsung Business. All thoughts and opinions are my own. One of the big topics at this year’s Mobile World Congress in Barcelona is cybersecurity, particularly as it relates to mobility. As the workforce becomes increasingly and more fluidly mobile, the challenge for IT departments, regardless of business size, is to provide the right mix of security …

View Post

Sharing: The #1 Reason Your Company Security Will Be Breached

In Security by Shelly KramerLeave a Comment

Many companies are headed to the cloud these days looking for new and better ways to collaborate, store, and share information. Is yours? Whether you’re going the public, private, or hybrid route, moving to the cloud is a very popular decision—in fact, you’ll find 93 percent of companies share your strategy. Of course you didn’t adopt cloud because you wanted …

View Post

Cloud, Mobility, Security, and Big Data: The Big Four for Business Growth [Study]

In Cloud by Shelly KramerLeave a Comment

Companies failing to make a strategic investment in technology in key areas of their business may be missing out on opportunities for growth as a consequence. That’s one of the key findings from a recent report that suggests that it’s not just operational efficiencies that investment in technology can offer, but also impressive increases in revenue growth rates. This suggestion …