Cyber security not a priority for most sectors, study finds

Computer Weekly

Despite data breaches costing UK firms nearly £30bn in 2016, cyber security is still not a priority for most UK industry sectors, a study has revealed

Study 191

Enterprise adoption of encryption accelerating, study shows

Computer Weekly

Cloud adoption and escalating threats are accelerating adoption of encryption, a study has revealed

Study 123

Scientific study reveals Bitcoin is not dominant in cryptocurrency market

Computer Weekly

Study into the ecology of cryptocurrencies has found that investors only consider market share when buying

Study 134

DevOps largely failing to improve security, study shows

Computer Weekly

Despite the promise of improved application security, DevOps is failing to deliver due to some key barriers, an HPE study shows

Study 198

Most businesses vulnerable to cyber attacks through firmware, study shows

Computer Weekly

Company culture and overall attitude to security is a major contribution to vulnerability to cyber attack through firmware, a study by Isaca has revealed

Study 196

Trust issues stifling digital economy growth, study shows

Computer Weekly

Businesses that have products and services based on trust have a significant opportunity to future-proof their business, but those who do not risk being side-lined, a study shows

Study 198

UK lags behind Europe in digital risk awareness, study shows

Computer Weekly

UK business leaders are overly optimistic and less aware of digital risks than their European counterparts, a study has revealed

Study 136

Global spending on digital marketing nears $100 billion: study

CTOvision

44% growth is huge, especially in a market sized in billions of dollars. Spending on digital marketing grew by 44% last year in the US and Britain to $52 billion, with global spending on “martech” estimated to near a whopping $100 billion. The Moore Stephens survey covered 800 companies in North America, the Asia-Pacific, and Europe […]. News The Boardroom

Study 138

Early Experts Study Guide for Microsoft Specialist Certification Exam 70-534, Architecting Microsoft Azure Solutions

IT Pros Rock!

This exam study guide is intended as a study reference tool to assist experienced architects with preparing for Microsoft Specialist certification via Exam 70-534, Architecting Microsoft Azure Solutions. These are the same study resources that I am personally using to prepare for Exam 70-534 myself, so I’ve already taken time to proof and review each and every resource.( 70-534 study guide architect Certification Microsoft Azure EarlyExperts

Study 207

Study reveals employees’ fears over digital change

Computer Weekly

Many employees are fearful of the job risk associated with automation and company-wide digital transformation initiatives

Study 142

One in four Wi-Fi hotspots vulnerable to attack, study finds

Computer Weekly

At least one in four Wi-Fi hotspots are open to attack, a study by Kaspersky Lab reveals

Study 198

PNAS Editor Acknowledges Controversy of Facebook Study

CTOvision

As a private company Facebook was under no obligation” to observe these standards, said Mr. Verma, and the editors at PNAS determined that publicizing the study was appropriate despite Facebook’s secrecy. By Shannon Perry.

Study 207

Study: The Cost of Data Center Downtime Is Rising

Data Center Knowledge

A new study sponsored by Emerson Network Power reveals that the cost of downtime has increased 41 percent since an original 2010 study. Unplanned data center outages are expensive, and getting more costly.

Study 279

GDPR will require 75,000 DPOs worldwide, study shows

Computer Weekly

The General Data Protection Regulation is likely to help boost the data protection profession, with 75,000 data protection officers needed worldwide for organisations to comply with new EU rules

Study 200

In Controversial Study, Facebook Investigates Networks of Emotions

CTOvision

A recent political opinion study conducted by the American Institute for Behavioral Research and Technology found that altering individual news feeds has the potential to influence political opinions vis-à-vis election candidates – and could ultimately influence the outcomes of elections themselves.

Study 204

DDoS a top security and business issue, study shows

Computer Weekly

DNS should be at the core of information security strategies as DDoS attacks increasingly form part of wider cyber attacks and continue to ramp up to unprecedented levels, warns Neustar

Study 177

Case study: How the RAC is digitising roadside assistance

Computer Weekly

The RAC, an organisation steeped in tradition, is on a modernisation drive. We look at how Microsoft Azure is helping it digitise older cars

Software Defined Perimeter, Cloud Security Alliance: Coca-Cola Case Study

CTOvision

Coca-Cola was used as a case study. On September 30 th Sierra Ventures hosted their 9th CIO summit in Palo Alto, CA. One of the many topics coved at the event was software defined perimeter and cloud security alliance. Alan Boehme , the acting CISO at Coca-Cola.

Samsung study warns startups to up their security stance

Computer Weekly

New report finds small businesses must do cyber security better if they want to work with large enterprises

Study 147

Millions of sensitive IT services exposed to the internet, study finds

Computer Weekly

Encryption should become the default as study reveals millions of sensitive services are exposed to the internet, says Rapid7

Study 152

Most hackers can steal data within 24 hours, study shows

Computer Weekly

Most hackers are able to access company systems and steal valuable data within 24 hours, according to the Nuix Black Report, which aims to show which security technologies are worth investing in

Study 163

One in five businesses hit by ransomware are forced to close, study shows

Computer Weekly

More than half of UK companies have been hit by ransomware in the past year, a study on the impacts of this popular attack method has revealed

Study 159

Case study: Tamer Group boosts bandwidth and network connectivity

Computer Weekly

Saudi Arabian firm chooses point-to-point wireless to ensure it provides the connectivity required for a fast-growing business

Messaging apps a growing business security risk, study shows

Computer Weekly

Businesses should introduce urgent policy changes to catch up with the reality of employees’ use of messaging apps, which is a growing security risk, say security researchers

Study 132

Case study: Improving food safety and traceability

Computer Weekly

We look at how Transparency-One is using a Neo4j graph database to deliver traceability across the global food supply chain

Almost half of UK's largest councils lack cloud strategy, Eduserv FOI study reveals

Computer Weekly

Eduserv study into cloud take-up inside local authorities suggests council CIOs are still over-invested in on-premise technology

Study 133

Study Finds Most Corporate Networks are Outdated

Data Center Knowledge

Softchoice finds more than half of enterprise devices no longer supported by manufacturers Read More. Shared

Study 190

Human interaction still key to cyber attacks, study reveals

Computer Weekly

An analysis of threats faced by organisations in the first quarter of 2017 reveals that cyber attackers still rely heavily on user interaction

Study 140

Half of vehicle cyber vulnerabilities could give hackers control, study shows

Computer Weekly

Half of vehicle vulnerabilities could allow cyber attackers to take control of a vehicle and 71% are easy to exploit, according to a three-year study by IOActive

Study 135

Illumina Consulting Group (ICG) R&D Case Study Uses Streaming Analytics Platform LUX in Insider Threat Detection

CTOvision

Illumina Consulting Group (ICG) recently conducted an R&D Case Study using their streaming analytics platform, LUX, to process an Insider Threat dataset created by ExactData LLC and Carnegie Mellon University under DARPA sponsorship.

RAND Study: Shortage of Cybersecurity Experts? No Problem

CTOvision

The study incorporated cybersecurity literature, interviews with cybersecurity experts, and economic theory about labor markets to determine the severity and scope of the current shortage for cybersecurity professionals. By Shannon Perry.

Study 165

The Ethics Of Big Data: Facebook and Cambridge Analytica Are Writing New Case Studies For Us All

CTOvision

The term “Big Data” has been around quite a while (see a short history of Big Data here), but really came into mainstream discussion in 2007 (which also happens to be the first year CTOvision used the word). The phrase had an important role in helping many of us think through new architectures for how […]. Big Data CTO News

Case Study: How Swedish retailer Stayhard boosted sales online

Computer Weekly

Swedish retailer adopts cloud-based software to turn customer browsing into sales

6 Lesson Learned from ERP Case Studies

IT Toolbox

There are a thousand different sayings highlighting how much you can learn by looking at the past experiences of similar people. This is especially true when it comes to evaluating whether ERP is right for your company and what to expect once it’s implemented. Until you start working with ERP products on a daily basis

Field studies and Intranet Redesign

I'm not lost, I'm wondering

The corporate intranet, and Enterprise Social Networks, has to support a broad range of users and many different functional use cases. Understanding the context of the people who use the platform, including the things they do that are not directly on the platform, is critical in providing a “right” design. . Identifying the real problem is one of the main reasons to conduct field research. After all, if you solve the wrong problem, it doesn’t matter how well you solve it.

Study 40