Study: Most enterprise IoT transactions are unencrypted

Network World

Of the millions of enterprise- IoT transactions examined in a recent study, the vast majority were sent without benefit of encryption, leaving the data vulnerable to theft and tampering.

Study 114

Cyber security not a priority for most sectors, study finds

Computer Weekly

Despite data breaches costing UK firms nearly £30bn in 2016, cyber security is still not a priority for most UK industry sectors, a study has revealed

Study 191

Enterprise adoption of encryption accelerating, study shows

Computer Weekly

Cloud adoption and escalating threats are accelerating adoption of encryption, a study has revealed

Study 123

DevOps largely failing to improve security, study shows

Computer Weekly

Despite the promise of improved application security, DevOps is failing to deliver due to some key barriers, an HPE study shows

Study 198

Most businesses vulnerable to cyber attacks through firmware, study shows

Computer Weekly

Company culture and overall attitude to security is a major contribution to vulnerability to cyber attack through firmware, a study by Isaca has revealed

Study 196

Scientific study reveals Bitcoin is not dominant in cryptocurrency market

Computer Weekly

Study into the ecology of cryptocurrencies has found that investors only consider market share when buying

Study 134

Businesses underprepared for GDPR, study shows

Computer Weekly

Lack of consumer and regulatory understanding, combined with low technical and cultural preparedness, represents a major threat to revenue and brand value, according to a Symantec state of privacy report

Study 203

Early Experts Study Guide for Microsoft Specialist Certification Exam 70-534, Architecting Microsoft Azure Solutions

IT Pros Rock!

This exam study guide is intended as a study reference tool to assist experienced architects with preparing for Microsoft Specialist certification via Exam 70-534, Architecting Microsoft Azure Solutions. These are the same study resources that I am personally using to prepare for Exam 70-534 myself, so I’ve already taken time to proof and review each and every resource.( 70-534 study guide architect Certification Microsoft Azure EarlyExperts

Study 207

UK lags behind Europe in digital risk awareness, study shows

Computer Weekly

UK business leaders are overly optimistic and less aware of digital risks than their European counterparts, a study has revealed

Study 136

One in four Wi-Fi hotspots vulnerable to attack, study finds

Computer Weekly

At least one in four Wi-Fi hotspots are open to attack, a study by Kaspersky Lab reveals

Study 198

How to Increase AWS Certifications by 50% | Rackspace Case Study

Linux Academy

The post How to Increase AWS Certifications by 50% | Rackspace Case Study appeared first on Linux Academy Blog. Amazon Web Services Cloud AWS Certifications case study Rackspace

Study reveals employees’ fears over digital change

Computer Weekly

Many employees are fearful of the job risk associated with automation and company-wide digital transformation initiatives

Study 143

Study: The Cost of Data Center Downtime Is Rising

Data Center Knowledge

A new study sponsored by Emerson Network Power reveals that the cost of downtime has increased 41 percent since an original 2010 study. Unplanned data center outages are expensive, and getting more costly.

Study 279

Harvard study lays out best data strategies for multi-cloud environments

Tech Republic Cloud

Harvard Business Review released an in-depth study on what it takes to have a top-of-the-line strategy for big data

6 Lesson Learned from ERP Case Studies

IT Toolbox

There are a thousand different sayings highlighting how much you can learn by looking at the past experiences of similar people. This is especially true when it comes to evaluating whether ERP is right for your company and what to expect once it’s implemented. Until you start working with ERP products on a daily basis

GDPR will require 75,000 DPOs worldwide, study shows

Computer Weekly

The General Data Protection Regulation is likely to help boost the data protection profession, with 75,000 data protection officers needed worldwide for organisations to comply with new EU rules

Study 200

Case study: How the RAC is digitising roadside assistance

Computer Weekly

The RAC, an organisation steeped in tradition, is on a modernisation drive. We look at how Microsoft Azure is helping it digitise older cars

DDoS a top security and business issue, study shows

Computer Weekly

DNS should be at the core of information security strategies as DDoS attacks increasingly form part of wider cyber attacks and continue to ramp up to unprecedented levels, warns Neustar

Study 177

PNAS Editor Acknowledges Controversy of Facebook Study

CTOvision

As a private company Facebook was under no obligation” to observe these standards, said Mr. Verma, and the editors at PNAS determined that publicizing the study was appropriate despite Facebook’s secrecy. By Shannon Perry.

Study 147

Researchers: AI Behavior Should Be Studied

Information Week

As AI and underlying technologies such as machine learning and deep learning spread, we need to create a field of study that examines machine behavior

Study 64

Millions of sensitive IT services exposed to the internet, study finds

Computer Weekly

Encryption should become the default as study reveals millions of sensitive services are exposed to the internet, says Rapid7

Study 152

Samsung study warns startups to up their security stance

Computer Weekly

New report finds small businesses must do cyber security better if they want to work with large enterprises

Study 147

Pacific Steel and Recycling Case Study

IT Toolbox

Pacific implemented Magic xpi Integration Platform to improve efficiencies between manufacturing and enterprise resource planning (ERP) systems

One in five businesses hit by ransomware are forced to close, study shows

Computer Weekly

More than half of UK companies have been hit by ransomware in the past year, a study on the impacts of this popular attack method has revealed

Study 159

Most hackers can steal data within 24 hours, study shows

Computer Weekly

Most hackers are able to access company systems and steal valuable data within 24 hours, according to the Nuix Black Report, which aims to show which security technologies are worth investing in

Study 163

Case study: Tamer Group boosts bandwidth and network connectivity

Computer Weekly

Saudi Arabian firm chooses point-to-point wireless to ensure it provides the connectivity required for a fast-growing business

Case study: Improving food safety and traceability

Computer Weekly

We look at how Transparency-One is using a Neo4j graph database to deliver traceability across the global food supply chain

Study Finds Most Corporate Networks are Outdated

Data Center Knowledge

Softchoice finds more than half of enterprise devices no longer supported by manufacturers Read More. Shared

Study 190

Messaging apps a growing business security risk, study shows

Computer Weekly

Businesses should introduce urgent policy changes to catch up with the reality of employees’ use of messaging apps, which is a growing security risk, say security researchers

Study 132

Almost half of UK's largest councils lack cloud strategy, Eduserv FOI study reveals

Computer Weekly

Eduserv study into cloud take-up inside local authorities suggests council CIOs are still over-invested in on-premise technology

Study 133

Human interaction still key to cyber attacks, study reveals

Computer Weekly

An analysis of threats faced by organisations in the first quarter of 2017 reveals that cyber attackers still rely heavily on user interaction

Study 140

DoD Contractors: Your insights needed as part of NDIA study of DFARS on cybersecurity standards

CTOvision

If you do business with DoD you know the importance of complying with DFARS. If you don’t, you will be in violation of your contracts. So really it is not just important to know DFARS, it is mandatory. If you are a small business DFARS compliance can be hard.

Study 127

Long way before AI systems take over humans jobs: Study

CTOvision

Artificial intelligence (AI) systems have a long way to go before they can take over tasks and jobs traditionally performed by people, say scientists who highlighted the severe limitations of deep learning computer networks. Researchers at the University of California, Los Angeles (UCLA) in the US conducted various experiments which showed that it is easy to […]. Artificial Intelligence News

Study 92

Global spending on digital marketing nears $100 billion: study

CTOvision

44% growth is huge, especially in a market sized in billions of dollars. Spending on digital marketing grew by 44% last year in the US and Britain to $52 billion, with global spending on “martech” estimated to near a whopping $100 billion. The Moore Stephens survey covered 800 companies in North America, the Asia-Pacific, and Europe […]. News The Boardroom

Study 101

Half of vehicle cyber vulnerabilities could give hackers control, study shows

Computer Weekly

Half of vehicle vulnerabilities could allow cyber attackers to take control of a vehicle and 71% are easy to exploit, according to a three-year study by IOActive

Study 135