2014 CIO 50 nominations now open

Nominations are now open for CPI’s CIO 50 Awards and Forum 2014, honouring the attainment of competitive advantage and accelerated business success through IT.

Analysis: security weak spots

Reading the coverage of the recent breach of Adobe passwords, we learned that 1.9 million users used “123456” as their password. That’s right: out of 38 million cracked passwords, almost two million adults used ones more suited to five-year-olds.

Cyber-crime will not stop for Christmas

Threats lurk within networks, endpoints or devices, often hidden in poorly configured settings or permissions, ineffective data governance, access management and usage policies. These unseen threats come from all perimeters of the organisation and major trends such as BYOD, big data, cloud, and mobile apps have increased the challenge faced by IT leaders.

Arbor: average Middle East attack is 2.376Gbps

Arbor Networks’ 2013 research of DDoS activity in the Middle East has revealed that the average size of attacks in the region is 2.376Gbps and the average duration of an attack exceeds an hour and ten minutes.

GET TAHAWULTECH.COM IN YOUR INBOX

The free newsletter covering the top industry headlines