Nucleus Research: The Stages of An Analytic Enterprise
The following report, is based on a global survey of 706 IT and security professionals conducted in the United States, Canada, Germany, United Kingdom, Australia and New Zealand. The goal of the survey was to capture data on current attitudes and trends with mobile devices and IT security. This is the third survey on this topic and this report evaluates differences in responses to similar questions asked over the past two years.
Just as we’ve learned to tune out car alarms, so have we become impervious to the headlines of cybercrime. That’s despite cybercriminals stealing over 500 million identities1 in 2014, alone. According to a December 2014 Computer Weekly article2, “The production of malware continues on an industrial scale, with exploit kits and malware services putting sophisticated attack methods in the hands of relatively unskilled cyber criminals.” And unfortunately, ignoring the issue will not make it go away.
- NASA: We "know enough" to send humans to Mars
- SAP CEO touts tighter Google ties
- EMC hopes to extend ViPR Controller's reach with open-source release
- Dell bringing Windows desktop to Chromebooks through appliance
- Microsoft takes old Surface tablets in trade for new Surface 3
- Intel's 18-core Xeon chips tuned for machine learning, analytics
- Sprint hangs on to third-largest carrier position ahead of T-Mobile
- French lawmakers take first step toward gathering all communications metadata
- Apple Watch band guidelines exert careful control over design
- The Carly Fiorina teardown begins as '16 race heats up
- Telerik pitches new framework for building Android, iOS, Windows apps
- Microsoft wants Verizon to hand over names of suspected Windows pirates
- Can Elon Musk's battery really cut your power lines?
- Microsoft touts new update service as way for enterprises to go slow on Windows 10
- Cybercriminals borrow from APT playbook in attack against PoS vendors