INTERPOL, security researchers see West Africa cybercrime scene expanding and getting more sophisticated.By Kelly Jackson Higgins Executive Editor at Dark Reading, 0 comments | Read | Post a Comment
New York's new security regulations for financial industry viewed as potential model for other states. By Steve Zurier Freelance Writer, 0 comments | Read | Post a Comment
Only 29% of US businesses have cyber insurance; Deloitte outlines steps for insurance companies to improve risk models, communication, and policy sales.By Terry Sweeney Contributing Editor, 0 comments | Read | Post a Comment
Though there were no mega breaches, 2016 had more breaches on record than any previous year, according to a new report.By Jai Vijayan Freelance writer, 2 comments | Read | Post a Comment
Joshua Aaron and his two accomplices are charged with massive hacking of US financial organizations, securities fraud and money laundering.By Dark Reading Staff , 3 comments | Read | Post a Comment
A large majority of security leaders say they would switch to suppliers that offer product and service guarantees, according to a new survey.
By Ericka Chickowski Contributing Writer, Dark Reading, 1 Comment | Read | Post a Comment
Bank says cybercriminals faked client credentials to break into accounts and attempted to steal 5 billion rubles.By Dark Reading Staff , 2 comments | Read | Post a Comment
Tim Armandpour shares four lessons learned by implementing "Failure Fridays" at PagerDuty, and explains how your IT organization can benefit from the same approach.By Tim Armandpour, SVP Product Development, PagerDuty , 1 Comment | Read | Post a Comment
Sharyn Leaver of Forrester Research cites the fable of the tortoise and the hare: While slow and steady may sometimes win, here’s why a modern IT environment may require us to act more like the hare and less like the tortoise. By Sharyn Leaver, VP & Group Director, Forrester Research , 1 Comment | Read | Post a Comment
Even if your shop hasn't embraced DevOps and has no plans to do so, the practice offers leadership and communication guidance applicable to nearly every facet of IT. Here's what we learned from presentations at the DevOps Enterprise Summit in San Francisco.By Susan Nunziata Editorial Director, 0 comments | Read | Post a Comment
Despite geopolitical uncertainties, cyber threats are the financial industry's biggest worry, new data shows.By Emily Johnson Digital Content Editor, InformationWeek, 0 comments | Read | Post a Comment
Is your current IT role giving you the kind of well-rounded opportunities you need to succeed in the next five to ten years? There's seems to be a disconnect between opportunity and expectations when it comes to the way IT pros are viewed in the larger context of enterprise digital transformation. Here's what we learned from the 2016 InformationWeek US IT Salary Survey.By Susan Nunziata Editorial Director, 0 comments | Read | Post a Comment
Elliot Luber is a visiting assistant professor of business, management, and leadership at SUNY Empire State College's School for Graduate Studies. Here, he shares his views on what makes a great IT leader and provides four tips you can apply now to your own career journey. By Elliot Luber Assistant Professor of Business Management & Leadership, SUNY, 1 Comment | Read | Post a Comment
IT agility is about far more than adopting agile development practices. It requires a complete rethinking of your entire IT organization in order to help your company achieve the digital transformation needed to survive. That's the conclusion of a new report from The Hackett Group, which identifies four key steps to take as you begin your journey toward IT agility. By Susan Nunziata Editorial Director, 0 comments | Read | Post a Comment
We want to know about your top IT spending priorities for the year ahead. Take our flash poll and tell us where your IT dollars are headed. By Susan Nunziata Editorial Director, 0 comments | Read | Post a Comment
Cybersecurity firm Bishop Fox says tests have confirmed that cardiac devices made by St. Jude are susceptible to hacking.By Dark Reading Staff , 0 comments | Read | Post a Comment
Digitization, creating a new level of organizational interoperability, and the practice of bimodal IT are among the priorities for CIOs, according to the Gartner 2017 CIO Agenda. See how your IT priorities stack up.By Susan Nunziata Editorial Director, 2 comments | Read | Post a Comment
Group of Seven nations’ new guidelines include sharing updates by governments, private firms and regulators, plus joint address of shortfalls.By Dark Reading Staff , 0 comments | Read | Post a Comment
Those behind the Odinaff Trojan are using tools and infrastructure associated with the infamous Carbanak cybercrime group, security vendor saysBy Jai Vijayan Freelance writer, 0 comments | Read | Post a Comment
Patents aren't typically the first thing on your mind when you're developing an application for your enterprise. Yet, there's a great deal of creative development work going on at organizations of all types and sizes. Attorney Lincoln Essig provides five steps IT professionals and enterprise app developers can take to make sure your company's intellectual property is protected. By Lincoln Essig Partner, Knobbe Martens, 0 comments | Read | Post a Comment
To save this item to your list of favorite Insurance & Technology content so you can find it later in your Profile page, click the "Save It" button next to the item.
If you found this interesting or useful, please use the links to the services below to share it with other readers. You will need a free account with each service to share an item via that service.