All Slideshows | Page 4


Disruption, Competition to Fuel Tech M&As in 2017

A significant share of IT companies plan to pursue merger and acquisition deals in the next 12 months, with many currently exploring five deals or more, a new survey from EY finds. However, compared ...Read More

Digital Business Drives New Workflow Opportunities

There's a lot of interest in re-engineering workflow processes, but little consensus in terms of who best to rely on to achieve that goal, according to findings of a global survey of 1,021 small a...Read More

Addressing IT Security: Automated Tools Needed

New research indicates a direct correlation between the use of automated tools to find and fix vulnerabilities and misconfigurations in security and network devices and satisfaction levels to complete those t...Read More

Retailers Need Better Security, Privacy Protection

A new survey shows that a majority of U.S. consumers will think twice about shopping at a retail store that was a victim of a cyber-attack. Two of their biggest worries when online are security and downlo...Read More

Millennials Show New Interest in Security Careers

If there is one bright spot in the run-up to the U.S. presidential election, it's the increased interest in cyber-security careers among millennials. This is thanks partly to nearly daily news reports ove...Read More

What the Channel Should Know About Dell EMC

Under the leadership of Dell EMC Global Channel Chief John Byrne, the combined entity is racing to unify its channel, which is among the largest the IT industry has ever seen. However, navigating that cha...Read More

Government IT Organizations Get Behind IoT

Large-scale internet-of-things projects typically require some level of interaction with IT systems managed by local, state and national governments. CompTIA, in a survey of 172 professionals with responsibili...Read More

Reliance on IT Security Services on the Rise

A marked increase in the volume and complexity of IT security attacks appears finally to be pushing more organizations to rely on external IT security expertise. In a global survey of 200 IT professionals with...Read More

Organizations Should Improve Their Security Hygiene

Organizations are undermining cyber-security strides they have made by failing to enforce best practices concerning known vulnerabilities, including privileged accounts, third-party vendor access and da...Read More

How Cloud, BYOD Strategies Create Insider Threats

Two of the biggest reasons businesses continue to struggle with insider threats are the adoption of cloud computing technology and bring-your-own-device (BYOD) practices. A new survey reveals that nearly t...Read More
<1234567> Last
(Page 4 of 38)