|
White Paper: ABBYY Software Automated text classification ensures that your data migration assigns priority to business-critical information ... and avoids wasting resources on moving documents that are redundant, obsolete, or trivial. Download our solution brief to learn how. Read More ▶ |
Voting officials can take several steps to improve security, even a couple that can still happen this year. Read More ▶ |
|
How do you disrupt an election? Hacking a voter registration database could very well do just that. Read More ▶ |
|
The question on the mind of many U.S. voting security experts is not whether hackers could disrupt a U.S. election. Instead, they wonder how likely an election hack might be and how it might happen Read More ▶ |
|
|
Recent attacks by Russians on the U.S. elections systems has raised fears about voting integrity. We examine which fears are realistic and which are overblown Read More ▶ |
|
"Planning for the 'what ifs' is not just about imagining events that are hard to imagine. It is about knowing which of your business functions will determine your ability to weather a crisis," says Bill Tibbo. Read More ▶ |
|
A federal judge has ruled it is plausible that four national credit-card companies improperly conspired “in lockstep” to set a deadline of Oct. 1, 2015 for requiring retailers to upgrade their technology to accept embedded chip cards for credit and debit card purchases. Read More ▶ |
|
The FBI has arrested a U.S. government contractor for allegedly stealing classified documents, which may involve hacking tools from the National Security Agency. Read More ▶ |
|
What Yahoo was looking for with its alleged email scanning program may have been signs of code used by a foreign terrorist group. Read More ▶ |
|
Security guru Bruce Schneier reported recently that the companies that maintain the “backbone” of the internet have been under increasing attacks designed to test their defenses. It’s the kind of thing, he said, that could mean an effort to take down the internet is in the works. Read More ▶ |
|
These 10 ways are becoming all too common approaches, but yet users still fall for them. Read More ▶ |
|
Experts in financial services, IT, security and compliance discuss the major issues facing IT executives at financial services companies. Read More ▶ |
|
White Paper: ABBYY Software Explore how automatic text classification ensures that your information is properly secured, compliant with all legal requirements, and maintained according to your retention schedule. Read More ▶ |
What projects are CIOs prioritizing in the year ahead? Where are they spending those precious IT dollars? These are the questions that will be answered (with your help!) in our 16th annual State of the CIO survey. Make your voice heard! ▶ |
Historically, hardware upgrades on Windows PCs that involved major changes (new motherboard and/or CPU, for example) required a phone call to Microsoft to reactivate the Windows license. Microsoft has altered its licensing policy to cut down on calls. Here’s what happened when we tested this hypothesis. ▶ |
Cloud-based ERP will eventually rule, and on-premises software is destined for legacy status. How can IT ensure a smooth transition? ▶ |