In The News

Many state and local government agencies have taken steps to address cybersecurity concerns, but too often those measures are insufficient or, worse, offer managers a false sense of security. In many cases, malicious code or a breach goes undetected for months because the agency has not implemented the tools and procedures that would have detected and mitigated those attacks. Many still rely on firewalls, signature- based detection and traditional antivirus products on their endpoints.

Big Data has become a fairly common term used across industries. It refers to large, complex volumes of data that are generated from multiple sources. According to a new report by SNS Research, Big Data is now a $57 billion market, and it is predicted that investments in the sector are expected to grow by 10 percent over the next four years, reaching $76 billion by the end of 2020.

In the rapidly evolving world of technology, clients need an established firm with the resources, longevity and vision to stay ahead of the curve. Siwel and Micro Strategies announce the formation of a strategic relationship to address our clients’ current and future business challenges, utilizing each other’s strengths to provide enhanced Cloud, Security, Analytics, Software and I/T Asset Management (SAM/ITAM), Enterprise Content and Business Process Management (ECM/BPM), and I/T Infrastructure services and solutions.

Since buying his first Mustang in 1979, high-performing Ford vehicles have appealed to New Jersey tech CEO Anthony Bongiovanni, whose stable has since included a Focus ST, various Mustangs, and almost always an F-Series truck or two. But it took a trip to Old Bridge Township Raceway Park to make him realize racing was in his blood.

Cyber theft is the fastest-growing crime in the United States, yet despite elevated concerns, many businesses are still not prepared.1 According to Ernst & Young’s 19th Global Information Security Survey 2016-17, only 22 percent of 1,735 global executives, information security managers and IT leaders surveyed fully consider information security in their strategy and planning.

Pages