Why Organizations Fail to Secure Third-Party Remote Access

SecureWorld News

I think the most common risk and what we found in the research is that only 30% of those IT and security leaders we spoke with actually have a standardized strategy, approach, and methodology for allowing third-parties into critical systems and applications.

Running IT Like A Business: Where Are We?

Chuck's Blog - EMC

  Business execs say there''s much more room for improvement than IT leaders think: improving time to market, communicating a clear vision, gaining the trust of business stakeholders, informing the business of new services, articulating business value, enabling innovation and collaboration, and supporting mobility.  The concerns should seem familiar: data security, application integration, ensuring compliance, figuring out how the service gets paid for, compliance, and more.

Survey 138

3 lessons that CIOs learned in 2018

mrc's Cup of Joe Blog

As organizations start to use data, capturing more and more user demographics, credit-card numbers and identifying information, companies cannot afford to have this valuable information compromised, exposed or stolen. They still spend the vast majority of their time and budget on maintenance and support. Now, am I saying that IT shouldn’t support the business? But, they spend time on tasks that they could offload to end users. The reason: It doesn’t end.