Columbus IT consulting jobs at largest firms up 25 percent over 2016 – Here are the top 5 firms by employment

(Source: Columbus Business First) IT consulting is growing in Central Ohio: The 25 firms included in this year’s Information Technology Consultants List reported 5,546 local full-time consultants, …

Read more ›

Kaspersky launches information hungry VPN app for Android

(Source: Ghacks Technology News) Kaspersky launches information hungry VPN app for Android … The Center for Democracy and Technology has filed a complaint against Anchorfree, Inc, the …

Read more ›

Facebook bans white nationalist’s accounts over hate speech

(Source: 13abc Action News) A former information technology worker who moved to New Hampshire from New York in 2012, the 36-year-old Cantwell describes himself as a white nationalist …

Read more ›

Zeneth Technology Partners Announces Merger with PierceMatrix

(Source: Markets Insider) Zeneth Technology Partners (Zeneth), an information technology and security firm with a strong focus on the …

Read more ›

Oracle and Andhra Pradesh IT Academy integrate cloud computing and IoT in their curriculum

(Source: Firstpost) Oracle and Andhra Pradesh Information Technology Academy (APITA) on 1 August extended their agreement to integrate Oracle Academy curriculum focusing …

Read more ›

Video Conferencing Network Best Practice Guide

It’s no secret that video conferencing is a productivity powerhouse around the office. For users, it helps improve employee engagement and creates a better sense of community among globally dispersed teams. But the IT departments implementing the solution will find some unique benefits of their own. An all-in-one solution like Lifesize can replace legacy audio-only conferencing services and provide audio, […]

The Benefits of Blockchain to Supply Chain Networks

Analysts project blockchain being adopted by supply chain operations as the next step for this new, evolving technology.

Ponemon Institute’s 2017 State of Mobile & IoT Application Security Study

Our recent Ponemon Institute report reveals key findings from organizations’ ability to protect their mobile and IoT apps.

5 Steps to Achieve Risk-Based Application Security Management

Internally developed software applications support the most sensitive and strategically important business processes of most enterprises. Yet application security is one of the most neglected fields of cybersecurity.

The Business Value of a Security Monitoring and Analytics Platform

In this research report, Aberdeen Group defines the advantages of a platform approach to cybersecurity.