HOT TOPICS: Customer Experience Marketing Automation Social Business SharePoint 2013 Document Management Big Data Mobile DAM

Risk News & Analysis

Can the Internet of Things Help You Connect to Higher Profits?

2015-26-february-all-connected

Businesses that  embrace the Internet of Things (IoT) will be up to 10 percent more profitable by 2025, according to a new study from Verizon (registration required).

Before you rush to make new connections, consider the obvious. Verizon has a vested interest in promoting the IoT. In 2014, the company saw a 45 percent year-over-year revenue growth in its own IoT business — which translated to about $585 million of its $88 billion in revenue in 2014.

Still, the research is interesting.

Verizon, using proprietary data and results of commissioned studies from ABI Research, estimates there were 1.2 billion different devices connected to the Internet last year and that the number will rise to 5.4 billion by 2020 for an annual growth rate of 28 percent.

So how can you tap in to boost your bottom line?

Why You Should Be Worried (and Angry) About Lenovo

2015-24-february-scary-superfish.jpg

By now, the entire tech world has heard all about the egg on Lenovo’s face. The incident — Superfish’s catastrophic security screw-up — was all over the news last week: "New Lenovo PCs shipped with factory-installed adware," said Engadget. "Lenovo poisoned its own PCs with Superfish adware," from CNET. "Lenovo caught preloading 'Superfish' adware on laptops," according to TechSpot.

The coverage has been extensive, detailed and informative. There’s one big problem with it, though: it’s all wrong.

Superfish is far, far worse than anything those articles might have led you to believe. It’s more accurate to say that it’s a near-total gutting of your machine’s network security. Security analyst Marc Rogers described Superfish as “quite possibly the single worst thing I have seen a manufacturer do to its customer base.” Here’s why.

Week in Review: Get Better at SharePoint + ECM, WCM Partnership

EMC, Meet Hippo
WCM and ECM providers form a partnership.

Back to Basics for Web CMS
It's time to cut through the chaos.

Community Management Analyzed
Managers still suffering from lack of money.

Collaboration Trends
The pulse of today's collaboration tools.

Big Data for All
Geeks and non-geeks: Microsoft wants you. 

Increase SharePoint Productivity
Simple steps to raise SharePoint productivity.

Selling the Story: The Content and Commerce Combination 
A look at trends sweeping over the commerce landscape

Download E-Book

sponsored item

Most Popular

Editor's Picks

Around the Web

Featured Events (all events | post your event)

Featured Research 

Amazon Muscles Deeper into the Enterprise Space

Amazon Web Services has introduced several upgrades aimed at moving it deeper into the enterprise space.

Its identity and access management (IAM) upgrades, for instance, make it easier for enterprise users and, specifically, systems administrators, to manage and change identities and security settings.

Jeff Barr, Chief Evangelist for Amazon Web Services, explained In a blog post that the upgrade enhances longstanding IAM features, which until now been associated with single users and the identities they governed.

Microsoft Adds 4 Security Measures to Office 365

Microsoft has added four security measures to Office 365 to help businesses keep their data secure. Two of the measures are focused on compliance and the other two offer better identity protection.

Are four new measures at once a bit much? Not if you consider things like the recent Anthem breach.

Microsoft’s drive to ensure Office 365 security and compliance is nothing new. But with the number of high profile information breaches growing, everyone responsible for enterprise data is a bit edgy.

6 Reasons Hackers Love the Internet of Things

2015-13-february-hackers.jpg

Haven't jumped on the Internet of Things (IoT) because of security concerns? New research from HP Fortify shows there's reason for caution.

HP Fortify researchers reviewed ten IoT-connected home security systems and found all of them are vulnerable to account harvesting via the cloud connection or interface.

But that’s not all. They also found all systems could work with weak security passwords, all of them were lacking an account lock-out mechanism, 90 percent didn’t have a two-factor authentication option and 70 percent had problems with systems updates.

Massive Health Insurance Hack Exposes 80M Customer Records

The second largest health insurer in the US admitted last night it was the target of a massive hack that resulted in as many as 80 million customer and employee records being compromised.

According to a statement from Joseph R. Swedish, CEO of Indianapolis-based Anthem Inc., the attack came to light last week. Cyberthieves stole large amounts of personal data of past and present customers — including names, birthdays, medical ID and social security numbers, street addresses, email addresses and employment information, including income data.

But Swedish, apparently trying to look at the bright side, added that no credit card or medical records, including claims, test results and diagnostic codes, were targeted compromised ... at least from what investigators can determine right now.

Bug Bounty Programs Help Companies Track Vulnerabilities

2015-3-february-giant-ant-from-WB-movie-them.jpg

Companies release new software and products to corporate users and consumers, hoping final product releases are stable and free of bugs.

But it's much easier said than done to release a secure and polished product. While companies try to work diligently to prevent vulnerabilities, they can only be partly successful with sometimes limited organizational capability by their respective internal teams.

That's where bug bounty programs come in.

During a recent Open Web Application Security Project (OWASP) conference, a hosted bug bounty contest found more than 80 vulnerabilities for the companies that participated. These types of contests and hosted programs are becoming more popular, taking place at other major computer and technology conferences across the United States.

Once discovered by third-party coders, companies move rapidly to analyze reports and fix legitimate vulnerabilities before they can be exploited.

Office 365 Extends Email Security to Address Spammers, Phishers

Microsoft is tightening up the security of its email offerings on Office 365 through the extension of features.

The goal here is to provide a “safer client experience” that will authenticate senders and help identify untrusted senders, helping to protect your system from spam and phishing campaigns, the tech giant explained.

While Office 365 is already pretty secure, Microsoft maintains the only way to beat hackers and other Internet nuisances is to keep one step ahead.

Kofax Simplifies E-Signature Capture, Processing

2015-12-faux-digital-signature.jpg

Kofax has kicked off the New Year with the launch of a family of e-signature products that the company claims will enable organizations of all sizes to improve digital transaction management.

The new products from the Irvine, Calif.-based financial technology company include Kofax SignDoc Standard and Kofax SignDoc Enterprise, as well as integration with the Kofax TotalAgility process automation suite. What’s more, Kofax boasts it is offering the new products at prices that will make them universally accessible and disrupt the status of a very competitive market.

Google for Work Puts Security in the Hands of Employees

Microsoft may be making a lot of noise about additional security features in Office 365, but Google has been working away behind the scenes too, if perhaps in a less vocal way. Yesterday, it launched the Devices and Activity dashboard, which monitors Google accounts on enterprise devices.

The new dashboard provides IT administrators a way of monitoring who has been accessing what accounts, where and why, but adds an underlying current to the security discussion that's becoming increasingly important in enterprises: responsibility.

Securing Social Business in Office 365

2014-10-27 office 365 DLP.jpg

Microsoft continues to weave the web around Office 365 tighter and tighter.

Over the past few months it has added more and more functionality to Office 365 and expanded its reach across and even beyond the enterprise. It is now adding additional security to keep enterprise data safe.

Microsoft introduced new compliance features last week. This week it is extending Data Loss Prevention functionality across the entire Office 365 product.

Hackers Want Your CRM Data: Here's What To Do

2014-7-October-hacker-fight.jpg

The cyberattack on JPMorgan Chase has affected 76 million household accounts, a far larger number than originally expected. The inroads hackers made into the bank has rattled the tech and financial community, to say nothing of Capitol Hill, where legislators are looking anew at cybersecurity legislation.

The reason for their nervousness is clear: JPMorgan Chase is probably one of the most protected institutions in the world. If hackers can successfully breach its security, what chance do other companies stand?

It's a sobering question and there is no pat response other than to treat the event as a wake up call: if a company or industry is perceived to have a rich treasure trove of data within its systems, know that it's fair game to hackers.

And what contains more rich, personalized data than customer relationship management (CRM) systems?

Did JPMorgan's Data Breach Need to Be So Massive?

It’s all over the morning news. Late yesterday, in a filing with the US Securities and Exchange Commission,  JPMorgan Chase revealed that more than half of American households were affected by last summer’s data breach at the bank.

We’re talking about 76 million personal  and 10 million business accounts from which “user contact information – name, address, phone number and email address – and internal JPMorgan Chase information relating to such users have been compromised,”according to the New York Times.

It is reportedly the biggest such intrusion ever.

Why You Must Identify Risks in SharePoint Technology #SPTechCon

information management, Why You Must Identify Risks in SharePoint Technology #SPTechCon

SharePoint stakeholders can't know their risks without knowing their requirements.

And they can't know their risks without knowing the potentially adverse effects of those risks.

Bill English, 11-consecutive SharePoint MVP winner, champions these thoughts. Knowing your risks and potential outcomes can lead to strong governance and compliance.

And as English told an audience here today at the SharePoint Technology Conference at the Boston Park Plaza hotel, "Governance is the enforcement of compliance." 

Displaying 1-15 of 174 results

< Previous 1 2 3 4 5 6 7 8 9 10 11 12 Next >