Bad news for those who thought the worst of the Heartbleed bug was already behind us. Security researchers are warning this problem isn’t going away overnight. In fact, expect it to keep creeping up for several months.
It’s become almost cliché to say at this point, but IT’s role in the company is undergoing a serious shift – and maybe not for the better.
With Big Data and cloud applications thrust onto its plate, IT has increasingly become the go-to department for business intelligence (BI) projects. But turning data into business decisions is a constantly changing field – which makes it hard to catch up, let alone know what’s coming next.
At first, BYOD was something a few brave companies were giving a shot. Then it became a nice way to get users off corporate devices. Now company phones are rare and BYOD is becoming the norm. What’s the next hurdle for Bring Your Own Device? Keeping it from becoming a legal liability.
The Heartbleed bug made the jump from technology news sites to major media outlets incredibly quickly. The standard advice was for users to change passwords on sites they care about and keep an eye out for suspicious activity. But now there’s some alarming news for IT pros: Servers are also at risk.
Just when you thought the Windows XP end-of-life would be the last deadline you’d have to scramble to meet, Microsoft has added a new ultimatum – and this one’s only a month away.
So let’s see, there’s the cloud, security breaches, bring your own device … what are we forgetting here? Oh, right. Email. That thing that still takes up huge amounts of IT’s time and resources every day.
There was probably a time in your career when you were the only person in the company who had heard the term “the cloud,” let alone had any idea of how it works. But two new surveys show the problem might now be that everyone outside of IT feels like they know it all when […]
The OpenSSL library, a cryptographic service for up to two-thirds of the web, has recently patched a serious and far reaching vulnerability that could allow a hacker to snoop on your files completely undetected.
Some professionals like to complain about their nine-to-five jobs. But for many in IT, that kind of regular schedule sounds almost like a dream come true.