Public Policy
Su | Mo | Tu | We | Th | Fr | Sa |
---|---|---|---|---|---|---|
Su | Mo | Tu | We | Th | Fr | Sa |
---|---|---|---|---|---|---|
It’s never good news when your workloads, data, or both get hacked in a public cloud. Fortunately, it’s something that rarely occurs. But as workloads and data sets on the public clouds become more numerous, such a hack could occur...View Post
Salary increases are one of the most fundamental part of an organization’s ability to attract and retain talent. It’s a tool used motivate employees, reward commitment and loyalty, and...View Post
If the Equifax breach caused 143 million U.S. consumers to have their email credentials, Social Security numbers and birth dates, plus other personal information accessible to hackers, then that...View Post
Smartphones have made work extraordinarily flexible. But keeping them safe has gotten tough as sophisticated and dedicated hackers seek to exploit bring-your-own-device (BYOD) environments. …..View Post.
The internet of things (IoT) was big for many large enterprises in 2016, but only 18 percent of small companies and 13 percent of those in the middle ranks identified it as a top-three priority....View Post
In this article, we’ll define SD-WAN, discuss the reasons you might want to deploy one, and explain the benefits you’ll reap by doing so. … View Post
The Equifax hack exposed the personally identifiable information of 143 million people and has created a tremendous ethical, public relations, and legal dilemma for the company. Stakeholders are...View Post
Every digital strategy is shaped and motivated by business need. The desire to improve the overall customer experience and achieve competitive differentiation is a principal driver of many digital...View Post
A politely ferocious debate is being waged in America right now about the best place to launch a startup. This isn’t surprising post-Great Recession – especially with millions of mobile...View Post
When it comes to cybersecurity, there’s strength in numbers. In my role as CenturyLink’s chief security officer, I oversee the strategy to protect CenturyLink’s clients, employees and...View Post
How does an enterprise juggle how to protect their business while optimizing their budget? They turn to the experts: Managed Security Service Providers (MSSP). … View Post
Multi-cloud solutions are no longer simply an alternative for enterprise data storage, but are rapidly becoming part of the new normal in the business world. By utilizing public, on-premises,...View Post
The cloud is growing. There were 1,427 cloud services in use at organizations in 2016, an increase of 23.7 percent from 2015. Approximately 18 percent of the data that goes into the cloud has some...View Post
Several recent ransomware and malware attacks have focused attention on the hacker group known as The Shadow Brokers and tricks they use to penetrate systems and compromise data. Among their...View Post
Cybersecurity threats are evolving rapidly as recent headlines demonstrate in stark terms. This New York Times story draws the parallels between the WannaCry attack and the more recent attack that...View Post
Some of the most devastating hacks in recent years have involved huge numbers of computers linked together in botnets. Attacks using botnets have been around for years, but explosive growth in IoT...View Post
While the security of cloud computing has always been a concern, many of the issues that once limited cloud computing deployments for businesses have fallen by the wayside. However, enterprises...View Post
If the recent cyber attacks have taught us anything, it is that most people are dangerously unprepared for them. Cybersecurity should be at the forefront of virtually every industry, yet it is...View Post
The past year has been tough for enterprise security teams. Attacks like Petya and NotPetya suggest that the impact scale is increasing dramatically. The recent leak of government-developed...View Post
Check your smartwatch. How long has it been since your enterprise experienced a cybersecurity attack? In a rapidly expanding threat environment, it probably isn’t very long at all – even if...View Post
Cybersecurity is once again on everyone’s mind as the latest major data breach grabs headlines, creates potential victims of identity theft and calls into question the overall security of major...View Post
Smart homes are here … Read more…→
By Stacy Hartman, Director, Public Policy
Backpack – check. Binders – check. Ballpoint pens – check. I fondly recall the excitement that back-to-school shopping for these items would instill...
For today’s retailers, understanding shifting consumer trends can make the difference between a successful quarter or a painful restructuring. After being behind the curve in embracing the...View Post
When it comes to cybersecurity, there’s strength in numbers. View Post