National security may be at stake as private businesses try to manage a growing number of cyberthreats, but IT professionals shouldn't have to bear that burden alone.
An analytics company is trying a novel approach to evaluating risk: by putting a price on it.
Data encryption could help enterprises protect their sensitive information against mass surveillance by governments, as well as guard against unauthorized access by ill-intended third parties, but the correct implementation and use of data encryption...
In a 2012 customer survey conducted by the Corporate Executive Board (CEB), 70 percent of respondents said they do not have a formal risk-appetite approach in place. "Seventeen percent said they have something in place that is actually working," conf...
Public companies may need to look more closely at their exposure to cyberattacks after new guidelines were released this week by the U.S. Securities and Exchange Commission.
Over the last two decades, the primary contribution of information technologies in firms has been about efficiency and enablement: to improve processes, make people more productive, reduce time to market, or enable things that couldn't be done previo...
It could be a natural disaster that closes cities for days at a time, or a power failure that knocks out corporate e-mail systems for a few hours. An endless variety of potential business disruptions confronts finance executives. And when crisis come...
While the race between industrial control system attackers and defenders didn't start with the Stuxnet worm, it certainly acted as a catalyst to a new arms race and more researchers taking a closer look at the quality of SCADA software.
East Japan entered its fifth day of power rationing on Friday, with no end to the planned blackouts in sight. The power shortages began last week when a massive earthquake and tsunami knocked nuclear power stations offline. The local electrical util...
Prices of widely used chips, including NAND flash memory and DRAM, have both risen sharply since the 9.0-magnitude earthquake struck and hurled tsunami waves at the northeastern part of Japan.
Enterprise reinvention and enterprise risk management have been a challenge to implement in many large organizations. The key to unlocking the potential of both is to understand and overcome why the traditional implementation approach consistently st...
Despite the hoopla surrounding cloud computing, almost half of U.S. IT managers are still wary of using cloud computing services within their own operations, according to the results of a survey released Wednesday by the Information Systems Audit and...
Cloud computing users face problems including loss of control over data, difficulties proving compliance, and additional legal risks as data moves from one legal jurisdiction to another, according to a assessement of cloud computing risks from the Eu...
Somali pirates who brazenly attacked container ships in the Indian Ocean have garnered a lot of recent attention. But for companies that source products from Chinese manufacturing partners, there are even greater and longer-term business risks due to...
Most Popular Reviews
- 1 Medion Akoya E4110 (MD 8239) desktop PC
- 2 Samsung Galaxy Tab S (10.5) 4G review
- 3 Kogan Agora 4G review
- 4 Motorola Moto E review
- 5 OnePlus One: An Australian review
Best Deals on GoodGearGuide
Latest News Articles
- VMware acquires CloudVolumes for faster virtual app delivery
- HP reports surprise growth as PC sales climb
- R programming language gaining ground on traditional statistics packages
- How can the Internet have too many routes and not enough addresses?
- OnBeep developing walkie-talkie type wearable for mobile devices
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.