article thumbnail

ACC Foundation Releases Extensive State of Cybersecurity Report

CTOvision

Employee error was the most frequent cause of a breach (24%), followed by inside jobs (15%), phishing (12%), access through a third party (12%), lost laptop or device (9%), application vulnerability (7%), and malware (7%). Related articles. PPL forms program for nonprofit groups (republicanherald.com). About Ballard Spahr.

Report 150
article thumbnail

9 ways IT leaders can impact sustainability initiatives

CIO Business Intelligence

Many CIOs don’t know where to start,” says Brian Kirkland, CIO at Choice Hotels and founding board member for SustainableIT.org, a nonprofit launched to help create frameworks and standards around sustainability. CIO Wetmur is taking things a step further at Morgan Stanley with a more sustainable approach to application development.

Nonprofit 131
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Author and Tech Strategist Melvin Greer Profiled by WashingtonExec

Cloud Musings

Mel also leads The Greer Institute , a nonprofit, nonpartisan think tank. The institute is organized for educational research and scientific application of Greer’s theories on leadership and innovation and addresses society’s related problems. If you enjoyed this article , get free updates by email or RSS - © Copyright Kevin L.

article thumbnail

Industry leaders set cloud computing security benchmarks

Cloud Musings

Both nonprofits, their individual missions and goals are synergistic: CSA: To promote best practices for providing security assurance within cloud computing and provide education on the uses of cloud computing to help secure all other forms of computing. If you enjoyed this article , get free updates by email or RSS - © Copyright Kevin L.

article thumbnail

Industry leaders set cloud computing security benchmarks

Cloud Musings

Both nonprofits, their individual missions and goals are synergistic: CSA: To promote best practices for providing security assurance within cloud computing and provide education on the uses of cloud computing to help secure all other forms of computing. If you enjoyed this article , get free updates by email or RSS - © Copyright Kevin L.

article thumbnail

NJVC® Introduces Cloudcuity? AppDeployer to Create and Sell

Cloud Musings

NJVC® Introduces Cloudcuity™ AppDeployer to Create and Sell Software Applications. “Cloudcuity AppDeployer offers an alternative to writing business applications from scratch the old slow and costly way. Although AppDeployer is designed for ease of use, it can support the development of complex applications.

Cloud 99
article thumbnail

The Hacker Mind: Shattering InfoSec's Glass Ceiling

ForAllSecure

Anyway, what Chenxification does for example is frustrate computer malware's ability to locate and extract an application's decryption key. To this day, the US Department of Defense uses chenxification to protect mobile applications. So I also have recently launched a nonprofit called the Forte group.