How to blunt spear phishing attacks
According to Allen Paller, director of research at the SANS Institute, 95% of all attacks on enterprise networks are the result of successful spear phishing. Here are the steps IT can take to protect...
View ArticleHow social CRM customizes marketing, brings new revenue
Segmenting customers and watching their habits on Facebook and other social networks shows the music company how to customize its marketing.read more
View Article10 trends shaping IT hiring in 2013
Concerns about the economy and budget battles on Capitol Hill have put a damper on the IT job scene, but not enough to thwart expansion.read more
View ArticleBally's CIO pumps up customer experience with iPads, QR codes and video
The health club chain deploys customer-friendly technologies to change an intimidating culture and save a failing business model.read more
View ArticleSo you want to be a data scientist?
Here's the scoop on one of the fastest growing and most talked-about roles in IT.read more
View Article13 tips for writing an effective cover letter
Creating an effective IT cover letter can mean the difference between getting the job or your resume getting trashed. These tips from IT career coaches and insiders will make your cover letter stand...
View ArticleIT spending on (slight) rise, mobile tops the list
Forty-eight percent of the CIOs surveyed expect to increase spending this year, up slightly from this time last year. Mobile, business intelligence, and cloud infrastructure and services are the most...
View ArticleRunning the ROI numbers on BYOD
With hard data in short supply, the value of consumer devices is in the eye of the beholder.read more
View ArticleMicrosoft faces a loss of relevance
The company is struggling to maintain its place in tech in the face of a badly received Windows upgrade. read more
View ArticleAs BYOD explodes, IT managers learn to cope
Five tech departments share strategies for coping with BYOD.read more
View ArticleCrowdsourcing offers a new and wider path to innovation
GE, Allstate try crowdsourcing contests where external brainiacs compete to produce the best answers to big-data analytics questions.read more
View ArticleHow to avoid legal hassles when switching cloud vendors
Negotiate initial cloud computing contracts to address data ownership and pricing, or you risk delaying the migration when you want to change providers.read more
View ArticleSecurity tools can't keep hackers at bay
Breaches like one that exposed credit card data of Schnucks supermarket customers for four months could become commonplace. read more
View ArticleMobile devices: Too much of a good thing?
If you own five or more mobile devices, you may be suffering from device overload.read more
View Article7 steps to securing Java
Warnings from Homeland Security should prompt security pros to harden enterprise nets against Java-based exploits.read more
View ArticleHow Fortune 500 companies are managing BYOD
Employees must accept strict controls and security policies prior to gaining network access.read more
View ArticleIT Resume Makeover: Make your messaging clear
Whether you work in IT or any competitive field, a resume that doesn't quickly illustrate who you are, what you do and why an employer needs you will be summarily dismissed.read more
View ArticleHot cloud products IT pros swear by
Spending on cloud services is so far just a fraction of total IT spending -- roughly 3% -- but the market is growing. IT pros explain what they like about their favorite cloud-based security, storage...
View ArticleBYOD decision points: Who pays?
As enterprises implement BYOD initiatives, IT managers have some key decisions to make: who purchases the devices, who pays for data plans and carrier contracts, and how does the company manage a mix...
View ArticleTen best practices for the cloud
With over 80% of companies now claiming to use some form of cloud solution, best practices and lessons learned abound.read more
View Article
More Pages to Explore .....