Technology: Page 20
-
NicoElNino. Retrieved from Shutterstock.
The Biggest Cyber Threat Is Inside Your Company
It seems as if cybersecurity is in the news constantly these days. Everyone talks about the threats from state actors looking for political or commercial advantage, organized criminal groups looking for theft or extortion opportunities and monetizable information, even random individuals with an ...
By John Parkinson • June 10, 2015 -
NicoElNino. Retrieved from Shutterstock.
SEC Suggests, But Doesn’t Require, Full Disclosure of All Cybersecurity Risks
While the Securities and Exchange Commission is not mandating that publicly traded companies disclose all cybersecurity threats, it’s recommending that they lean toward the side of full disclosure, according to a Monday article in the Wall Street Journal.Companies now have to report cybersecurity...
By Katie Kuehner-Hebert • June 8, 2015 -
Explore the Trendline➔
Getty Images
TrendlineThe CFO Strategy for Artificial Intelligence
Artificial intelligence’s impact on the office of the CFO continues to evolve, and finance chiefs must be aware of the opportunities it will create for growth.
By CFO.com staff -
NicoElNino. Retrieved from Shutterstock.
EU Favoring Broad Scope for Cyber Attack Rules
The European Union is considering tougher and broader rules on cyber attack disclosures that could apply to “Internet enablers” such as Google and Facebook.Bloomberg reported Friday that any company covered by the proposed rules would be required to notify government agencies in the 28-nation blo...
By Katie Kuehner-Hebert • June 5, 2015 -
NicoElNino. Retrieved from Shutterstock.
Data Breach Costs Climb to Average of $3.8M
The total average cost of a data breach for companies around the world has increased to $3.8 million, up from $3.5 million a year ago, reflecting in part a higher frequency of malicious or criminal cyber attacks, according to a new report.The Ponemon Institute’s annual Cost of a Data Breach study...
By Matthew Heller • June 1, 2015 -
NicoElNino. Retrieved from Shutterstock.
IRS Discloses Cyber Attack on Online Service
Amid increasing concern over the security of Internal Revenue Service computer systems, the agency has disclosed that hackers accessed the personal tax data of more than 100,000 taxpayers in an effort to claim fraudulent refunds.The IRS said it had determined late last week that “unusual activity...
By Katie Kuehner-Hebert • May 27, 2015 -
NicoElNino. Retrieved from Shutterstock.
New Flaw Discovered in Website Encryption
The discovery of an encryption flaw that puts web surfers’ data at risk could boost the opposition to law enforcement efforts to weaken data encryption protections.The BBC reports that the flaw, dubbed LogJam, was discovered by researchers at Microsoft and a number of U.S. and French universities...
By Matthew Heller • May 20, 2015 -
NicoElNino. Retrieved from Shutterstock.
Phaseout of Internet Explorer Stirs No Grief
Internet Explorer hasn’t exactly been getting glowing eulogies since Microsoft announced that it will be replaced with a new default browser.Microsoft’s browser of the future is code-named Project Spartan and will make its debut with the upcoming Windows 10 operating system. IE will be included i...
By Matthew Heller • April 7, 2015 -
NicoElNino. Retrieved from Shutterstock.
Counting on IT to Deliver Top Investment Returns
This is the sixth in a series of six articles about the volatile financial misfortunes and turnaround of trucking company YRC worldwide. See parts one, two, three, four and five.Jason Ringgenberg arrived at YRC Worldwide in April of 2014, after the company’s latest debt restructuring and union la...
By David McCann • Feb. 10, 2015 -
NicoElNino. Retrieved from Shutterstock.
Facebook Says User Research Will Be Vetted
In the wake of harsh criticism Facebook faced after a study revealed last June how the social network titan had manipulated posts in its feeds, the company says future research on its 1.3 billion users would be “subjected to greater internal scrutiny from top managers, especially if they focused ...
By Iris Dorbian • Oct. 3, 2014 -
NicoElNino. Retrieved from Shutterstock.
Mid-day Links for August 19th, 2014
Sign up for a free subscription to the CFO Newsletter! – http://bit.ly/1w59vR4 Newly discovered faulty accounting does nothing to inspire confidence in Alibaba’s impending IPO – http://bit.ly/1pWmhvl SEC to set new rules that give regulators more power to take “disciplinary action” and “create a ...
By Donna Makar • Aug. 19, 2014 -
NicoElNino. Retrieved from Shutterstock.
Companies Embrace Mobile Collaboration
With the creation of cloud-based platforms, file sharing is becoming ubiquitous, and for companies, embracing mobile collaboration is crucial for survival.Courtesy of Flickr user FutUndBeidl. CC-BY Indeed, at many companies, these mobile platforms give employees the freedom to contribute to their...
By Alissa Ponchione • Oct. 8, 2013 -
NicoElNino. Retrieved from Shutterstock.
Caveat Emptor for BlackBerry Customers, Experts Say
Companies using BlackBerry’s mobile-device-management (MDM) platform should be cautious about the company’s future. Although the service is rated highly for its security features, its customers could take a significant financial hit if BlackBerry were to fail, as some observers think could happen...
By Alissa Ponchione • Sept. 26, 2013 -
NicoElNino. Retrieved from Shutterstock.
Special Report: Benchmarking Tech Spending
A number of crucial factors will drive CFOs to higher and higher levels of tech spending in the next couple of years, according to experts quoted in this CFO Special Report on information-technology expenditures. The prime suspects, says one analyst, are social media; mobile devices like smartp...
By David Katz • Aug. 26, 2013 -
NicoElNino. Retrieved from Shutterstock.
Time to Dust Off Your IT Vendor Strategy
The conventional approach to managing IT vendors though a bidding and selection process may not be adequate when it comes to new, emerging and disruptive technologies. The shift from capital-intensive IT purchasing to “as-a-service” models is only one among a number of fundamental changes reshapi...
By Rob Livingstone • Aug. 26, 2013 -
NicoElNino. Retrieved from Shutterstock.
Lawsuit filed over bad software outsourcing
Orange County had hired a contractor to develop custom software to modernize its tax collection—a project that was to take three years and cost about $8 million, according to a Computerworld report. But the project was costing more than $16 million and taking twice as long, the county claim...
By Keith Button • Aug. 20, 2013 -
NicoElNino. Retrieved from Shutterstock.
Several factors driving IT security spending increases
The bring-your-own-technology trend and the shift to cloud computing solutions are “forcing businesses to rethink their security posture and fueling product refresh cycles,” Canalys reported.IT security spending in North America is forecasted to increase 5 percent over the next five years, Ca...
By Keith Button • Aug. 20, 2013 -
NicoElNino. Retrieved from Shutterstock.
Something new to blame on enterprise software projects
The world’s largest dairy exporter, Fonterra of New Zealand, is looking into its IT systems in the wake of a botulism scare that led to a partial ban of Fonterra products in China and a total ban in Russia this month, according to a ZDNet article.Then again, the connection between botulism an...
By Keith Button • Aug. 20, 2013 -
NicoElNino. Retrieved from Shutterstock.
Measuring the Full Impact of Digital Capital
On July 31, the U.S. Bureau of Economic Analysis will release, for the first time, Gross Domestic Product (GDP) figures categorizing research and development as fixed investment. It will join software in a new category called intellectual-property products.In our knowledge-based economy, this is ...
By James Manyika and Jacques Bughin • July 29, 2013 -
NicoElNino. Retrieved from Shutterstock.
The Exciting Potential of the Industrial Internet
Have you heard of the phrase “Industrial Internet”? Coined by General Electric, it refers to the integration of complex physical machinery with networked sensors and software. Its components include machine learning, big data, the Internet of things and machine-to-machine communications. If you t...
By Timothy Chou • July 11, 2013 -
NicoElNino. Retrieved from Shutterstock.
Turning Trash into Treasure
Where staffers have the ability to freely create or download files such as Word documents, spreadsheets, emails or the output from Smart-Boards, and then store the files somewhere in your organization’s IT infrastructure, cloud or otherwise, they are adding to your pool of unstructured data. Glob...
By Rob Livingstone • July 1, 2013 -
NicoElNino. Retrieved from Shutterstock.
Making a List
Q: I need to create a unique list of customers from a large list. How do I do it?A: You can build a pivot table report with customers in the row area of the layout. Because the pivot table creates a summary report, the first column of the table will include the unique list of customers.Here’s wha...
By Bill Jelen • June 5, 2013 -
NicoElNino. Retrieved from Shutterstock.
Social Business: Valuable Inside as Well as Out
When’s the last time you approached an employee, perhaps about a new software tool or a cloud-based financial management system, and asked, simply, “What do you think of this?” If you can’t recall, says Vala Afshar, chief marketing and customer officer for network security firm Enterasys, your bu...
By Taylor Provost • May 23, 2013 -
NicoElNino. Retrieved from Shutterstock.
Taming the Hydra of Big Data
Editor’s Note: This is the first installment of a more broadly-focused column by our regular contributor Rob Livingstone. It will feature advice and analysis on Big Data and other emerging, potentially disruptive technologies. Big Data is the next “big thing” to come out of the IT world, and car...
By Rob Livingstone • May 9, 2013 -
NicoElNino. Retrieved from Shutterstock.
All the Excel Shortcuts
If you would like to submit a question to Bill “MrExcel” Jelen, e-mail him at [email protected].
By Bill Jelen • May 8, 2013 -
NicoElNino. Retrieved from Shutterstock.
More Department Leaders Make Their Own IT Decisions
Senior management executives are increasingly budgeting for information-technology purchases particular to their own functional areas or departments, beyond what’s included in corporate and IT-department budgets.In a survey by research firm Forrester, conducted from August to November 2012, 92 pe...
By Taylor Provost • May 7, 2013