Cloud Security Fears Exaggerated Says Federal CIO
Outgoing federal CIO Vivek Kundra believes that cloud security issues ave been used to discourage cloud adoption. That's not stopping the Department of Homeland Security.
By Patrick Thibodeau
The U.S. D...
Sniffer Hijacks Secure Traffic From Unpatched iPhones
Almost anyone can snoop the secure data traffic of unpatched iPhones and iPads using a recently-revised tool, a researcher said today as he urged owners to apply Apple's latest iOS fix.
By Gregg Keiz...
Why IT Outsourcing Deals Are Getting Smaller
IT outsourcing deals are getting smaller, particularly in the U.S., as companies are loath to invest the big bucks required for large contracts, according to research by outsourcing consultancy TPI. But that's...
Best Practices for Streamlining Sourcing Life-Cycle Governance
For sourcing organizations to mature, they must understand both the complexity of the sourcing process and the intricacy of each step of the life cycle. Here are some best practices for sourc...
SpyEye Trojan Morphs to Defeat Online Banking Defenses
Banks are facing more trouble from SpyEye, a piece of malicious software that steals money from people's online bank accounts, according to new research from security vendor Trusteer.
By Jeremy Kirk...
Cognizant Acquires CoreLogic's India Services Operations
Cognizant Technology Solutions, a U.S. outsourcer with large Indian operations, said Tuesday it had entered into a definitive agreement to acquire the Indian services operations of CoreLogic, an in...
Zeus for Android Steals One-Time Banking Passwords
Researchers have discovered a new variant of the insidious Zeus trojan that is designed to run on Google Android smartphones.
Angela Moscaritolo, SC MagazineResearchers have discovered a new variant of ...
Many Employees Would Sell Corporate Information
Research from SailPoint asked thousands of global employees about how they are using sensitive corporate data and found many in one country would be willing to steal it and sell it for profit.
By Joan Good...
Network Intelligence Optimization for Total Access
Many of you are striving to gain network intelligence for analysis, inline security and WAN acceleration but struggle with total network access due to prohibitive costs. VSS Monitoring strives to provide...
Facebook Scams Popping Up That Exploit Norway Tragedy
Facebook scams are popping up from people looking to exploit Friday's bombing and shootings in Norway. Users should be careful not to click on links they are not familiar with.
By Melanie Pinola, CIO...
The 5 Biggest IT Security Mistakes
Like cleaning the windows, IT security can be a thankless task because they only notice when you don't do it. But to get the job done in the era of virtualization, smartphones and cloud computing, you've got to avoid te...
Anonymous Hacks Italy's Cybercrime Police
Italy's specialist police unit responsible for combating cybercrime suffered an embarrassing hack Monday by members of the loosely knit Anonymous hacktivist galaxy.
By Philip Willan, CIO.comIDG News Service — ...
House Republicans Consider High-Skills Immigration Bill
The negotiations to strike a deal on the debt ceiling may be getting all the attention in Congress, but there are also new efforts by lawmakers to address high-skill immigration issues.
By Patrick ...
Learn About Real-Time Defense Against Criminal Malware
Recent headlines concerning attacks on Sony, Citibank and Amazon highlight the growth of criminal malware worldwide. No longer the work of individual hackers out to make mischief, these botnet malwa...
Security Experts Knock Google on PC Infection Warnings
Security experts are leery of Google's decision to warn millions of users whose PCs it believes are infected with fake security software and other malware.
By Gregg Keizer, CIO.comGoogle has taken t...
Change the Labels, Shift Perspectives of Security
When hired into an organization, each person has a defined responsibility, set of skills and sphere of influence. In essence, each individual is an expert contributing to the success of the organization.
IT Outsourcing: How Offshoring Can Kill Innovation
Harvard Business School professors Gary Pisano and Willy Shih argue that overzealous offshore outsourcing can cripple a company's ability to innovate. Pisano and Shih discuss what CIOs can learn from the...
Infrastructure at Risk: Taking Decisive Action to Secure Your Critical Data Assets
A New Virtual Event brought to you by InformationWeek and Symantec
Date: July 28, 2011Time: Virtual Doors Open at 11:00 am ETRegister HEREAccording to the Department of H...
State Street Cuts IT Staffers, Shifts Work to IBM, Wipro
Although State Street Corp. is laying off 530 IT workers and transferring another 320 jobs elsewhere, tech hiring nationally remains on the upswing so far this year.
By Patrick Thibodeau, CIO.comS...
Outsourcing Slumps in the Second Quarter
Outsourcing declined worldwide by 18 percent to US$16.4 billion in the second quarter because of weak demand in the Americas and an overall drop in the number of large contracts awarded, sourcing data and advisory...