Cyber security not a priority for most sectors, study finds

Computer Weekly

Despite data breaches costing UK firms nearly £30bn in 2016, cyber security is still not a priority for most UK industry sectors, a study has revealed

Study 191

Scientific study reveals Bitcoin is not dominant in cryptocurrency market

Computer Weekly

Study into the ecology of cryptocurrencies has found that investors only consider market share when buying

Study 134

Enterprise adoption of encryption accelerating, study shows

Computer Weekly

Cloud adoption and escalating threats are accelerating adoption of encryption, a study has revealed

Study 123

DevOps largely failing to improve security, study shows

Computer Weekly

Despite the promise of improved application security, DevOps is failing to deliver due to some key barriers, an HPE study shows

Study 198

Businesses underprepared for GDPR, study shows

Computer Weekly

Lack of consumer and regulatory understanding, combined with low technical and cultural preparedness, represents a major threat to revenue and brand value, according to a Symantec state of privacy report

Study 203

Study reveals employees’ fears over digital change

Computer Weekly

Many employees are fearful of the job risk associated with automation and company-wide digital transformation initiatives

Study 141

One in four Wi-Fi hotspots vulnerable to attack, study finds

Computer Weekly

At least one in four Wi-Fi hotspots are open to attack, a study by Kaspersky Lab reveals

Study 198

iPhone Vs Android — A Comparative Study 2018

Galido

Information Technology Blog - - iPhone Vs Android — A Comparative Study 2018 - Information Technology Blog. The post iPhone Vs Android — A Comparative Study 2018 appeared first on Information Technology Blog.

Study 56

GDPR will require 75,000 DPOs worldwide, study shows

Computer Weekly

The General Data Protection Regulation is likely to help boost the data protection profession, with 75,000 data protection officers needed worldwide for organisations to comply with new EU rules

Study 200

DDoS a top security and business issue, study shows

Computer Weekly

DNS should be at the core of information security strategies as DDoS attacks increasingly form part of wider cyber attacks and continue to ramp up to unprecedented levels, warns Neustar

Study 177

Case study: How the RAC is digitising roadside assistance

Computer Weekly

The RAC, an organisation steeped in tradition, is on a modernisation drive. We look at how Microsoft Azure is helping it digitise older cars

Early Experts Study Guide for Microsoft Specialist Certification Exam 70-534, Architecting Microsoft Azure Solutions

IT Pros Rock!

This exam study guide is intended as a study reference tool to assist experienced architects with preparing for Microsoft Specialist certification via Exam 70-534, Architecting Microsoft Azure Solutions. These are the same study resources that I am personally using to prepare for Exam 70-534 myself, so I’ve already taken time to proof and review each and every resource.( 70-534 study guide architect Certification Microsoft Azure EarlyExperts

Study 147

Samsung study warns startups to up their security stance

Computer Weekly

New report finds small businesses must do cyber security better if they want to work with large enterprises

Study 147

Millions of sensitive IT services exposed to the internet, study finds

Computer Weekly

Encryption should become the default as study reveals millions of sensitive services are exposed to the internet, says Rapid7

Study 152

One in five businesses hit by ransomware are forced to close, study shows

Computer Weekly

More than half of UK companies have been hit by ransomware in the past year, a study on the impacts of this popular attack method has revealed

Study 159

PNAS Editor Acknowledges Controversy of Facebook Study

CTOvision

As a private company Facebook was under no obligation” to observe these standards, said Mr. Verma, and the editors at PNAS determined that publicizing the study was appropriate despite Facebook’s secrecy. By Shannon Perry.

Study 152

Most hackers can steal data within 24 hours, study shows

Computer Weekly

Most hackers are able to access company systems and steal valuable data within 24 hours, according to the Nuix Black Report, which aims to show which security technologies are worth investing in

Study 163

Case study: Tamer Group boosts bandwidth and network connectivity

Computer Weekly

Saudi Arabian firm chooses point-to-point wireless to ensure it provides the connectivity required for a fast-growing business

Messaging apps a growing business security risk, study shows

Computer Weekly

Businesses should introduce urgent policy changes to catch up with the reality of employees’ use of messaging apps, which is a growing security risk, say security researchers

Study 130

Case study: Improving food safety and traceability

Computer Weekly

We look at how Transparency-One is using a Neo4j graph database to deliver traceability across the global food supply chain

The Ethics Of Big Data: Facebook and Cambridge Analytica Are Writing New Case Studies For Us All

CTOvision

The term “Big Data” has been around quite a while (see a short history of Big Data here), but really came into mainstream discussion in 2007 (which also happens to be the first year CTOvision used the word). The phrase had an important role in helping many of us think through new architectures for how […]. Big Data CTO News

Almost half of UK's largest councils lack cloud strategy, Eduserv FOI study reveals

Computer Weekly

Eduserv study into cloud take-up inside local authorities suggests council CIOs are still over-invested in on-premise technology

Study 133

Human interaction still key to cyber attacks, study reveals

Computer Weekly

An analysis of threats faced by organisations in the first quarter of 2017 reveals that cyber attackers still rely heavily on user interaction

Study 140

Study: The Cost of Data Center Downtime Is Rising

Data Center Knowledge

A new study sponsored by Emerson Network Power reveals that the cost of downtime has increased 41 percent since an original 2010 study. Unplanned data center outages are expensive, and getting more costly.

Study 201

Half of vehicle cyber vulnerabilities could give hackers control, study shows

Computer Weekly

Half of vehicle vulnerabilities could allow cyber attackers to take control of a vehicle and 71% are easy to exploit, according to a three-year study by IOActive

Study 135

Case Study: How Swedish retailer Stayhard boosted sales online

Computer Weekly

Swedish retailer adopts cloud-based software to turn customer browsing into sales

6 Lesson Learned from ERP Case Studies

IT Toolbox

There are a thousand different sayings highlighting how much you can learn by looking at the past experiences of similar people. This is especially true when it comes to evaluating whether ERP is right for your company and what to expect once it’s implemented. Until you start working with ERP products on a daily basis

In Controversial Study, Facebook Investigates Networks of Emotions

CTOvision

A recent political opinion study conducted by the American Institute for Behavioral Research and Technology found that altering individual news feeds has the potential to influence political opinions vis-à-vis election candidates – and could ultimately influence the outcomes of elections themselves.

Study 142

Case Study: Breaking the application delivery bottleneck

mrc's Cup of Joe Blog

The post Case Study: Breaking the application delivery bottleneck appeared first on mrc's Cup of Joe Blog. Summary: Many businesses face an application development bottleneck. Application development efforts can’t keep up with business demands.

Case study: How the Department for Education deployed flexible IT

Computer Weekly

The Department of Education has upgraded its ageing datacentre to the Azure cloud and Office 365, and rolled out Microsoft Surface devices

Software Defined Perimeter, Cloud Security Alliance: Coca-Cola Case Study

CTOvision

Coca-Cola was used as a case study. On September 30 th Sierra Ventures hosted their 9th CIO summit in Palo Alto, CA. One of the many topics coved at the event was software defined perimeter and cloud security alliance. Alan Boehme , the acting CISO at Coca-Cola.

Provide Cloud Services to the Feds? Study the Space-Weather Threat

Data Center Knowledge

Latest National Defense Authorization Act adds requirements for studying EMP threat to critical infrastructure Read More. Data Center World

Study 129

Amazon launches bursary to encourage women to study tech

Computer Weekly

During the AWS Summit in London, Amazon held an invite-only session to showcase its UK research and development

Study 143