Menu

Big Data / Features

6 internet of things trends that will dominate 2018

Many organizations are already incorporating IoT technologies into their products, processes and workflows, but 2018 is shaping up to be a breakout year for IoT deployments. Here are six IoT trends to watch in 2018.

Written by Thor Olavsrud10 Jan. 18 22:00

Is your data being sold on the dark web?

Monitoring the dark web to see if your data is being sold there is risky, but solutions and services are available to help.

Written by Maria Korolov03 Nov. 17 23:22

15 essential project management tools

Project managers play a vital role in organizational success. Having the right set of tools to tackle analytics, requirements, change and project progress will help you perform at your best.

Written by Moira Alexander13 Oct. 17 21:00

Shadow cloud apps pose unseen risks

When individuals and departments bypass IT to acquire cloud services and apps, IT and security teams are blind to the security vulnerabilities and compliance issues they present.

Written by Maria Korolov10 Oct. 17 22:00

A year after launch, how has Facebook Workplace fared?

With 14,000 organizations worldwide using its business collaboration app, Facebook has a foothold in the enterprise, but it faces stiff competition on multiple fronts.

Written by Matthew Finnegan04 Oct. 17 03:56

How to survive in the fake-information age

Understanding the emerging world of 'fake everything' is vital for figuring out what you and your company can do about it.

Written by Mike Elgan30 Sept. 17 21:00

What is SaaS? The modern way to run software

The era of installing software from a CD or from a datacenter’s server is coming to a close, as internet-delivered software makes applications available anywhere, anytime

Written by Bob Violino22 Sept. 17 20:00

What is a Scrum master? A key role for project success

With agile fast becoming standard practice at most companies, scrum masters are in great demand. Here is a look at the Scrum master role, relevant certifications, expected salaries, and job listings.

Written by Moira Alexander08 Sept. 17 20:00

10 signs you’re ready for AI — but might not succeed

Not every problem can be solved by machine learning, and not every company is poised to apply AI. Here’s how to know whether your IT organization is ready to reap the benefits of artificial intelligence.

Written by Martin Heller29 Aug. 17 20:00

8 top cyber-attack maps and how to use them

Cyber-attack maps can be fun to look at, but are they useful? As usual, when it comes to security context is key, so CSO looked at eight of the web's most popular cyber-attack maps. While the maps themselves are mostly eye candy with limited context, there are some creative ways they can be used.

Written by Steve Ragan22 Aug. 17 02:09

12 Microsoft Power BI success stories

Microsoft Power BI provides organizations with self-service business intelligence tools that allow users to analyze, visualize and share data using the familiar Microsoft Excel spreadsheet. Here are 12 success stories built on Power BI.

Written by Thor Olavsrud16 Aug. 17 20:00

Who is a target for ransomware attacks?

While any enterprise is a possible ransomware target, some are more likely than others to be caught in a cybercriminal’s crosshairs.

Written by Jim Martin14 July 17 23:51

Hurting for IT help? Hire a trained GI vet

One IT professional services firm is meeting increasing demand for U.S.-based skills by training military veterans in key IT domains, from business analysis to devops.

Written by Stephanie Overby29 May 17 20:00

Why gifts cards are the new favorite target for fraud

With tighter post-financial crisis regulation on larger amounts of money, and safer chip-enabled debit and credit cards, fraud has shifted to a new target, gift cards.

Written by Jen A. Miller04 May 17 02:48