National security may be at stake as private businesses try to manage a growing number of cyberthreats, but IT professionals shouldn't have to bear that burden alone.
An analytics company is trying a novel approach to evaluating risk: by putting a price on it.
Data encryption could help enterprises protect their sensitive information against mass surveillance by governments, as well as guard against unauthorized access by ill-intended third parties, but the correct implementation and use of data encryption...
In a 2012 customer survey conducted by the Corporate Executive Board (CEB), 70 percent of respondents said they do not have a formal risk-appetite approach in place. "Seventeen percent said they have something in place that is actually working," conf...
Public companies may need to look more closely at their exposure to cyberattacks after new guidelines were released this week by the U.S. Securities and Exchange Commission.
Over the last two decades, the primary contribution of information technologies in firms has been about efficiency and enablement: to improve processes, make people more productive, reduce time to market, or enable things that couldn't be done previo...
It could be a natural disaster that closes cities for days at a time, or a power failure that knocks out corporate e-mail systems for a few hours. An endless variety of potential business disruptions confronts finance executives. And when crisis come...
While the race between industrial control system attackers and defenders didn't start with the Stuxnet worm, it certainly acted as a catalyst to a new arms race and more researchers taking a closer look at the quality of SCADA software.
East Japan entered its fifth day of power rationing on Friday, with no end to the planned blackouts in sight. The power shortages began last week when a massive earthquake and tsunami knocked nuclear power stations offline. The local electrical util...
Prices of widely used chips, including NAND flash memory and DRAM, have both risen sharply since the 9.0-magnitude earthquake struck and hurled tsunami waves at the northeastern part of Japan.
Enterprise reinvention and enterprise risk management have been a challenge to implement in many large organizations. The key to unlocking the potential of both is to understand and overcome why the traditional implementation approach consistently st...
Despite the hoopla surrounding cloud computing, almost half of U.S. IT managers are still wary of using cloud computing services within their own operations, according to the results of a survey released Wednesday by the Information Systems Audit and...
Cloud computing users face problems including loss of control over data, difficulties proving compliance, and additional legal risks as data moves from one legal jurisdiction to another, according to a assessement of cloud computing risks from the Eu...
Somali pirates who brazenly attacked container ships in the Indian Ocean have garnered a lot of recent attention. But for companies that source products from Chinese manufacturing partners, there are even greater and longer-term business risks due to...
Latest News Articles
- Dating app Wyldfire tries to avoid creeps by letting women take the lead
- Tor Project working to fix weakness that can unmask users
- Hands on with Xiaomi's Mi 4, a high-end handset, with an iPhone look
- Teradata acquires assets of Hadapt, Revelytix for big data
- Verizon revenue rises steadily, driven by wireless service growth
Most Popular Articles
- 1 What's the difference between an Intel Core i3, i5 and i7?
- 2 Laser vs. inkjet printers: which is better?
- 3 Windows 7 Home Premium vs. Windows 7 Professional
- 4 How to play DVD movies on your Nintendo Wii
- 5 How do I connect my TV to the Internet?
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Best Deals on GoodGearGuide
- Notebooks View all »
- $25.99 free shipping
- Tablets View all »
- Mobile Phones View all »
- TVs View all »
- Digital Cameras View all »