As technology has spun forward, so has how supply chains work and the best practices to manage them. Here are five keys to supply chain management success.
Stories by Jen A. Miller
A look at who will and who won’t pay for an app and what it means for mobile app developers.
With tighter post-financial crisis regulation on larger amounts of money, and safer chip-enabled debit and credit cards, fraud has shifted to a new target, gift cards.
A network of travel agencies found the CRM system it had been using for eight years had become a monster, so it turned to a cloud-based option -- and the results were off the charts.
If it seems too good to be true, it probably is. Free Wi-Fi is no exception to this adage. Security company Avast tested this theory by setting up a number of free fake Wi-Fi hotspots to see how many people would take the bait. They caught a lot of fish.
With the 2016 Olympic Games promising to bring millions of visitors to Rio de Janeiro’s Galeão International Airport, its CIO initiated a huge wireless network upgrade and a new mobile app.
The short answer: They’re targeting sites in North America, where they’re planting malware in ad networks and launching dating site spam.
If IT leaders and IT workers can’t agree that there’s a problem, what are the chances that they’ll actually implement the cybersecurity policy they need?
As the desire for workplace flexibility continues to be an accepted fact of contemporary working life, more and more businesses are wrestling with how exactly to embrace – or curtail – telecommuting as the new normal.
Social engineering and ‘download this attachment’ scams are back – as if they ever left – and working better than ever, unfortunately.
From wearables to appliances to e-readers, there’s no shortage of possible security holes when almost every device is connected. What’s a CIO to do?
A new study shows that, on average, each computer in every office around the world has about $259 of unnecessary, unwanted or unused software on it. That’s a lot of shelfware – and it’s costing companies big-time.
It's that time of year: Round ups, hot takes and eulogies for the year abound. We're no different, but we're going to tell the story of 2015 a little differently -- though numbers. Ten of them to be exact. In no particular order, here's how hackers and scammers and the many security flaws they found got us on edge for this year … and the next.
The rise of IoT technology brings with it the promise of innovation the likes of which we’ve never seen. But the reality of everything being connected can have unintended consequences, not all of them useful.
The capability to profile potential cybercriminals, along with the implementation of chip-and-pin credit cards, may produce a reduction in the amount of money lost to online fraud each year. But that doesn’t mean the threat will go away entirely.
- CCData Warehouse Architect - Start JUNE 18QLD
- FTSenior SQL Server DBANSW
- CCDynamics CRM Functional Consultant - BrisbaneNSW
- FTCyber Security AnalystOther
- FTSystems EngineerVIC
- FTServer EngineerSA
- CCImplementation EngineerWA
- FTSenior Checkpoint Security EngineerOther
- CCData Migration lead - Energy and GasVIC
- FTTechnical Quality Analyst (Payments, data, application integration)VIC
- CCLinux AdministratorNSW
- FTPrinciple Health Sales Executive - Enterprise IT Healthcare Perm - Syd / MelbNSW
- CCSenior Project CoordinatorNSW
- CCLead Business AnalystQLD
- CCOrganisational Change ManagerNSW
- FTLevel 2 Support EngineerVIC
- CCXamarin DeveloperNSW
- CCSolution ArchitectNSW
- CCDeployment ManagerACT
- FTSenior Security EngineerOther
- CCMid - Level Dynamics CRM Functional Consultant - BrisbaneVIC
- CCSenior Development DBA - OracleNSW
- CCTest Analyst - SitecoreNSW
- CCPortal DeveloperNSW
- FTIT Security EngineerOther