Electronic Waste: An Issue That Requires Attention
Information technology has brought us all kinds of breakthrough products. Think of a GPS device, which lets you smoothly navigate the world or the computers that form the backbone of…
Information technology has brought us all kinds of breakthrough products. Think of a GPS device, which lets you smoothly navigate the world or the computers that form the backbone of…
FireEye, a company, which is committed in finding advanced solutions to prevent advanced cyber attacks, recently conducted a campaign, called ‘Data Stealing Campaigns’. We at cioaxis.com spoke to Ankit Anubhav,…
Sophos has released its global cybersecurity predictions for 2016 , which discusses the nature of evolving threats vis-à-vis rising complexity in securing the cyber space. These predictions indicate that as advanced attacks get more…
IT is more and more a key component of all business initiatives and is becoming an important part of those budgets, according to Gartner, Inc. CIOs must work with business…
Researchers regularly come up with revolutionary ideas to replace the clunky, fiddly and mostly rather insecure passwords we use for almost all of our authentication needs. The latest schemes to…
Today, one of the most common discussions I have is “How do I qualify the cyber security risk to my board?” The security industry is very good at being able…
Why isn’t being a CIO fair? Because you have to pay attention to both IT and the business, and the business only has to pay attention to the business. It’s…
Welcome to VMworld 2013 and Imagine Dragons. Love that “Radioactive” song! Oops, sorry, wrong blog. ;-) Seriously, I want to share with you some powerful developments in the evolution of…
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More