Tag Archives: value

Gartner Survey Reveals Business Value or Benefits Realization Is the Leading IT Cost-Optimization Priority for CIOs

IT cost optimization in most organizations is now largely focused on business optimization rather than cost cutting, according to a recent survey* by Gartner, Inc. Survey respondents revealed that their top criterion for selecting cost optimization priorities is business value or benefits realization, rather than the biggest or fastest cost reductions.

Gartner Survey Finds Banking and Investment Services CIOs are the Most Focused on Digitalization

Banking and investment services CIOs are increasingly convinced that their old business models and existing value propositions will not be sustainable in the future, according to a survey from Gartner, Inc. Gartner's 2018 CIO Agenda Survey gathered data from 3,160 CIO respondents in 98 countries and across major industries, including 354 banking and investment services CIOs.

[ISN] Inside HACK: The Sought-After Cyber Security ETF – ETF News And Commentary

https://finance.yahoo.com/news/inside-hack-sought-cyber-security-180006948.html By Sweta Killa Zacks.com Jan 20, 2015 The cyber security industry has gained immense popularity in recent years and is the fastest-growing corner of the broad technology space. This is because cyber-attacks on enterprises and government agencies are widespread with growing Internet usage, raising the need for more stringent cyber security from hackers. Hacking has become more sophisticated, dangerous and harder for companies (and even governments) to stop. According to the report from the Global State of Information Security Survey 2015, cyber attacks across the globe have risen about 66% over the past five years and 48% from 2013. Some of the well-known companies in the recent spate of data breaches include Target (TGT), eBay (EBAY), Home Depot (HD), AT&T (T) and JPMorgan Chase (JPM). The situation will likely to worsen in 2015, as hackers will continue to adopt advanced techniques and strategies to infiltrate networks hiding their tracks (read: PureFunds to Stop Hackers with This Cyber Security ETF). Solid Long-Term Prospects As per McAfee, cyber-warfare and espionage attacks are expected to increase in frequency. Attacks on Internet of Things (IoT) devices will rise rapidly due to whopping growth in the number of connected objects, poor security and the high value of data on IoT devices. And new mobile technologies will allow more mobile attacks. […]


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] Obama wants Congress to increase prison sentences for hackers

http://arstechnica.com/tech-policy/2015/01/obama-wants-congress-to-increase-prison-sentences-for-hackers/ By David Kravets Ars Technica Jan 14 2015 The Obama administration, currently engaged in a war of words with North Korea over the recent hacking of Sony Pictures Entertainment, is calling on Congress to increase prison sentences for hackers and to expand the definition of hacking. During next week’s State of the Union address, the president is set to publicly urge increased prison time and other changes to the Computer Fraud and Abuse Act—the statute that was used to prosecute Internet activist Aaron Swartz before he committed suicide in 2013. At issue is the Computer Fraud and Abuse Act (CFAA), passed in 1984 to bolster the government’s ability to nab hackers who destroy or disrupt computer functionality or who steal information. In general, the CFAA makes it illegal to “knowingly and with intent to defraud, accesses a protected computer without authorization, or exceeds authorized access, and by means of such conduct furthers the intended fraud and obtains anything of value, unless the object of the fraud and the thing obtained consists only of the use of the computer and the value of such use is not more than $5,000 in any 1-year period.” […]


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] CarolinaCon-11 call for papers/presenters

Fowarded from: Vic Vandal h4x0rs, stuff breakers, InfoSec pros, g33k girls, international spies, and script kidz, CarolinaCon-11, also referred to as “The Last CarolinaCon As We Know It”, will occur on March 20th-22nd 2015 in Raleigh NC (USA). We are now officially accepting speaker/paper/demo submissions for the event. If you are somewhat knowledgeable in any interesting field of hacking, technology, robotics, science, global thermonuclear war, etc. (but mostly hacking), and are interested in presenting at CarolinaCon-11, we cordially invite you to submit your proposal. Please send; – your name or handle/alias – the presentation name/title – a brief topic abstract (1-2 paragraphs) – the estimated time-length of your presentation – a brief bio (100% optional item, but if your talk is chosen it saves the time and trouble of asking for it later) ….via e-mail to: speakerscarolinacon.org *NOTE: All submissions are due BY January 1, 2015. However we may be making some early selections again this year from amongst the submissions, so please be timely in submission if you’re committed to being part of the elite cadre of chosen presenters. We value diversity so please don’t hesitate to propose your ideas no matter how outlandish. If you present at the Con, you will receive; – free CarolinaCon admission for you and one guest – one free CarolinaCon-11 T-shirt (l33t) – free transportation between RDU airport and the conference hotel (if needed) – minimal fame, glory, and possibly even notoriety – mad props and much love from our staff and attendees ATTENDEES: If you are interested in attending, watch this space for more details: www.carolinacon.org …and don’t forget to mark the March 2015 dates on your calendar. If you have any important (as in not-dumb and not-chinese-spam) inquiries about the event you can send email to: infocarolinacon.org We look forward to seeing you at our 2015 event. SPONSORS and/or VENDORS and/or ADVERTISERS: We don’t accept any so please don’t bother asking. Capitalism (what you vendor/sponsor types do) and philanthropic knowledge-sharing (what we do) don’t mix at CarolinaCon by design. We keep our admission price to the bare minimum to cover our venue and equipment expenses. All of our staff are volunteers who generously donate their time and energy. All of our presenters generously donate their time and talent. The only items sold at CarolinaCon are a limited quantity of single-design CarolinaCon t-shirts….and we only make and sell those because attendees and staff want them (and because they’re cool). Peace, Vic


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] ARRL Probing Web Server Breach by Hackers

http://www.infosecnews.org/arrl-probing-web-server-breach-by-hackers/ By William Knowles @c4i Senior Editor InfoSec News October 10, 2014 Last month a web server at ARRL Headquarters was breached by an unknown party. ARRL IT Manager Mike Keane, said that League members have no reason to be concerned about sensitive personal information being leaked, and assures members that there’s nothing of financial value on the compromised server. Some ARRL servers were taken offline and isolated from the Internet when the hack was discovered. Some web functions were temporarily disabled. The ARRL expects to restore service by close of business, on Wednesday, October 8, 2014 ARRL’s Mike Keane stressed that it is highly unlikely that any sensitive information was compromised. Any information the hacker might have been able to glean from the ARRL server, he said, is already publicly available — data such as names, addresses, and call signs that appear in the FCC database. The hacker may have been able to obtain site usernames and passwords that were established prior to April 2010, and that have not been changed since then. ARRL members who have not changed their ARRL website passwords since early 2010 should do so at this as soon as possible. […]


Facebooktwittergoogle_plusredditpinterestlinkedinmail