hr trends

Results 151 - 175 of 229Sort Results By: Published Date | Title | Company Name

Intelligence-Led Security: Develop a Concrete Plan

Published By: Cyveillance     Published Date: Apr 03, 2015
Protecting a business – including its information and intellectual property, physical infrastructure, employees, and reputation – has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Like many security trends and frameworks, the early stages of adoption often involve inconsistent definitions, challenges with justification and management communication and an unknown path to implementation. In this white paper, we: • Review the current threatscape and why it requires this new approach • Offer a clarifying definition of what cyber threat Intelligence is • Describe how to communicate its value to the business and • Lay out some concrete initial steps toward implementing Intelligence-Led Security
Tags : 
intellectual property, hackers, protection, leaks, security, threatscape, networking
    
Cyveillance

Physical Security Threat Landscape: Recent Trends and 2015 Outlook

Published By: Cyveillance     Published Date: Apr 06, 2015
In this white paper, we examine notable trends and events in physical security from 2014 and assess what security professionals should expect in 2015. 2014 was truly an unpredictable year in the physical security and executive protection worlds, as large scale events targeted for disruption were executed relatively smoothly, while unforeseen developments in Ukraine and the Ebola outbreak caught many off guard. Looking ahead to 2015, we predict that local issues will continue to gain global importance, threat actors and activists will find new ways to utilize social media to spread their messages, and the lines between physical and digital threats will continue to converge. We also highlight ongoing developments in France, Mexico, Ukraine, and Germany.
Tags : 
information security threat, information security, protection, security breach, internet security, networking, security
    
Cyveillance

IDG Research Shows Continuous Feedback Is the Future of Performance Management

Published By: GuideSpark     Published Date: Aug 01, 2018
IDG surveyed 1,500 HR decision makers, managers, and employees, and this is what they found: 88 percent of employees at firms with informal processes say they’re more satisfied with their jobs. Discover more of the latest trends in our white paper.
Tags : 
employee communication, employee engagement, employee experience, performance management, performance reviews, continuous performance management, informal conversations, informal performance management
    
GuideSpark

Preparation Begins at the Center

Published By: Equinix     Published Date: Mar 26, 2015
The businesses that thrive amid fluctuating technology demands are not only keeping a finger on the pulse of current trends, they have the infrastructure in place to handle whatever changes might come. And they’re doing so by treating their data centers as a strategic asset—a hub from which providers and performance can all stem. Are you ready for what’s next? According to analyst forecasts and IT executives, the five key trends affecting our state of technology are mobility, consumer technology, cloud services, hyperdigitization and globalization. In the following pages, you’ll learn how these trends are affecting current networks, and why a strategic data center is key to not only surviving, but thriving, today and in the future.
Tags : 
technology demands, infrastructure, mobility, consumer technology, cloud services, hyperdigitization, globalization, it management
    
Equinix

(Bullitt County) Kentucky School District Improves Classroom Experience with Network Investment

Published By: Avaya     Published Date: Jun 15, 2016
Expanding and enriching the educational experience through a streamlined, broadened networkBYOD in the classroom and one-student-one-device trends meant Kentucky’s Bullitt County Public Schools needed an easily configurable, reliable and scalable network. Read this case study to discover the benefits of WLAN technology in the educational world.
Tags : 
mobile device, best practices, networks, technology, wifi, wireless phones, wlan, productivity
    
Avaya

Cloud First: threat or an opportunity? This webinar will help you future proof your career in ITAM

Published By: Flexera     Published Date: May 30, 2019
"Cloud spend (IaaS, PaaS and SaaS) is growing 7 times faster than IT spend, and the pressure to innovate has never been greater. Today’s IT departments have to both sustain existing operations and compete through innovation—but managing the IT tangle can starve investment in your future. How do you manage today’s Cloud First movement with one eye on the future? “Cloud First: threat or an opportunity?”—an exclusive webinar from Flexera VP Presales Cynthia Tackett—will discuss what a Cloud First strategy really means for the future of ITAM and how we must adapt to future-proof our careers in the ITAM profession. You’ll learn about cloud trends, challenges and threats to your career, opportunities and your career path into the cloud, and how to future-proof your career. Register today! "
Tags : 
    
Flexera

2019 Shopper Vision Study: Two Sides to the In-Store Experience

Published By: Zebra Technologies (Bulldog)     Published Date: Jul 11, 2019
To improve performance and enhance customer satisfaction, you need to understand your customers. Every year, Zebra commissions a global shopper survey to help retailers capture their performance edge through deeper insight into their shoppers. Zebra’s 2019 Shopper Vision Study surveyed approximately 5,000 shoppers, 1,000 retail associates and nearly 500 retail decision makers around the world. Discover the current shopper preferences, retail technology trends and differing perceptions of preferences between retailers and shoppers that will help your operations be more effective.
Tags : 
    
Zebra Technologies (Bulldog)

Sales Performance Optimization 2007 Survey Results and Analysis

Published By: WebEx     Published Date: Apr 02, 2009
This report represents the summary findings of our thirteenth annual survey of challenges impacting sales performance today. We identify and analyze these challenges, and examine how organizations are leveraging people, processes, technology, and knowledge to address these issues successfully. In addition, beginning in the Executive Summary and continuing throughout the report, we raise questions about troubling trends and offer a new model for overcoming the problematic issues related to the field of sales.
Tags : 
webex, sales performance optimization, crm, sales force demographics, sell cycle analysis, detailed performance assessment, change analysis, sales knowledge management
    
WebEx

Sales Performance Optimization 2007 Survey Results & Analysis

Published By: WebEx.     Published Date: Apr 03, 2009
This report represents the summary findings of our thirteenth annual survey of challenges impacting sales performance today. We identify and analyze these challenges, and examine how organizations are leveraging people, processes, technology, and knowledge to address these issues successfully. In addition, beginning in the Executive Summary and continuing throughout the report, we raise questions about troubling trends and offer a new model for overcoming the problematic issues related to the field of sales.
Tags : 
webex, sales performance optimization, crm, sales force demographics, sell cycle analysis, detailed performance assessment, change analysis, sales knowledge management
    
WebEx.

Best Practices in Candidate Screening

Published By: iCIMS     Published Date: Jan 17, 2014
This webinar from iCIMS will show you how to equip your talent team with the proper screening technology, stay in compliance with HR regulations, and best practices for pre and post hire candidate screening.
Tags : 
icims, talent management, new hires, hiring, finding new employees, screening, new candidates, hr issues
    
iCIMS

Five tactics for compensation managers to shift the business

Published By: Success Factors     Published Date: Aug 19, 2014
With news of economic recovery reaching employees’ ears, compensation managers will have to face the challenge of creating compelling compensation solutions through proactively benchmarking, updating policies with the current state of the business, avoiding inefficient data analysis methods, visualizing reports and trends, and responding to the business
Tags : 
success factors, engage candidates, hiring process, candidate advocates, recruiting strategies, talent, hiring managers
    
Success Factors

College Hiring Trends 2015

Published By: WePow     Published Date: Sep 02, 2015
Get the latest insights on College Hiring trends from talent acquisition experts today! WePow, a leading video interviewing provider, teamed up with the Accelir, a strategic talent advisory firm, to uncover trends and tips for college recruiters, career services and corporate HR leaders.
Tags : 
video interview, video interviewing, hr technology, recruitment, recruiting, screening, talent acquisition, university
    
WePow

Video in 2015: Business, HR & Recruiting Trends Infographic

Published By: WePow     Published Date: Sep 02, 2015
Online video use has grown by huge numbers over the past few years and isn't showing any signs of slowing down. Beyond personal lives, the impact it is having on the way we do business and more specifically talent management can't be argued. Check out WePow's latest infographic on video trends in 2015.
Tags : 
video interview, hr technology, recruitment, recruiting, candidate screening, talent acquisition, digital interviewing, interview tips
    
WePow

Looking for Top Talent? Move to Mobile Recruiting

Published By: IBM     Published Date: Mar 28, 2016
Attracting talented job candidates is one of the biggest challenges facing HR in the next 10 years.1 Understandably, organizations want top talent and they are highly focused on recruiting strategies that enable them to hire the very best. One increasingly popular strategy is mobile recruitment. As mobile devices become ever more ubiquitous, potential candidates are starting to look more favorably at organizations offering a mobile recruitment option.2 But are all candidates created equal when it comes to mobile recruitment? We decided to take a look at the coveted members of the workforce and explore their use of and attitudes towards mobile recruitment. Using the high-potential employees subset of our global WorkTrends™ survey data, we were able to compare top talent, who significantly outperform their peers and demonstrate a stronger capacity to succeed,3,4 with other employees. The results provide new insight into mobile recruiting and guidance for organizations looking to attract
Tags : 
ibm, recruiting, mobile recruiting, mobile recruitment, recruiting software/services
    
IBM

Learn the 3 Most Significant Developing Trends for Enterprise Corporate Training in 2014

Published By: Human Capital Institute     Published Date: May 16, 2014
Learn how to better prepare your HR leaders for corporate training and see what the 3 most significant developing trends are for HR leaders involved in training and professional development.
Tags : 
hci, human capital institute, enterprise learning, information delivery, corporate learning, strategic learning, center for creative leadership, employee development
    
Human Capital Institute

Cylance 2017 Threat Report

Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : 
cyber attacks, cia, nsa, wannacry, notpetya
    
BlackBerry Cylance

Cylance Proactively Prevents Security Threats

Published By: BlackBerry Cylance     Published Date: Aug 22, 2018
According to Forrester, traditional approaches to endpoint security have become outdated and less effective as cyberthreats have increased in both number and complexity. To battle the ever-increasing threats, security professionals are now turning to new endpoint security technologies to either augment or replace their failing antimalware solutions. Below are the key trends in endpoint security, and the strategies that companies are using to address them.
Tags : 
cylance, proactively, security, threats, cyberthreats, cylance
    
BlackBerry Cylance

BlackBerry Cylance 2019 Threat Report

Published By: BlackBerry Cylance     Published Date: Apr 26, 2019
In 2018, BlackBerry Cylance observed many trends in the threat landscape, such as a decline in overall ransomware attacks, an increase in malicious coinminers, and a marked evolution of popular threats like Emotet. Additionally, overall malware attacks rose by 10% as attackers continue to hone their tools, skills, and tactics to threaten Windows, macOS, and Internet of Things (IoT) platforms. Read the BlackBerry Cylance 2019 Threat Report to understand these trends in greater depth, and to learn our recommendations to improve your security strategies.
Tags : 
    
BlackBerry Cylance

Why Organizations Need to Archive Email

Published By: GFI     Published Date: Jun 12, 2007
In a survey conducted throughout November and December 2004, SERVO asked 100 of their top customers which projects they were most likely to accomplish in 2005. Interestingly, email archiving made it to the top 5 corporate priorities and this finding can easily be backed up as recent market trends show a six-fold increase in demand for email archiving solutions.
Tags : 
email archiving, archive, archiving, email management, email, sarbox, sarbanes oxley, sarbanes-oxley
    
GFI

The CIO's Guide to Wireless in the Enterprise

Published By: BlackBerry     Published Date: May 22, 2008
Over the past decade, wireless technology has made huge strides in security, reliability and throughput. Companies that are moving forward with business mobility initiatives must plan for wireless security and mobile device management from the start. Learn about many of the notable trends and key issues associated with Business Mobility and where to find additional resources for consideration.
Tags : 
blackberry, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange
    
BlackBerry

What You Need to Know Now About Next-Gen Data Protection & Recovery Architecture

Published By: Arcserve     Published Date: Apr 22, 2015
We’ll walk you through the driving forces behind these rapidly evolving data protection architectures, the trends you’ll want to be keeping an eye on, what we should all demand of next generation architectures, and the state of the current market landscape.
Tags : 
network architecture, security, backup, disaster recovery, data loss, application security, cloud computing, data center design and management
    
Arcserve

What You Need to Know Now About Next-Gen Data Protection & Recovery Architecture

Published By: Arcserve     Published Date: Jul 15, 2015
We’ll walk you through the driving forces behind these rapidly evolving data protection architectures, the trends you’ll want to be keeping an eye on, what we should all demand of next generation architectures, and the state of the current market landscape.
Tags : 
    
Arcserve

Three Golden Rules For Safe And Sound Endpoints

Published By: IBM     Published Date: Apr 20, 2017
Cybercrime is more sophisticated and dangerous than ever before, and the scope of newly emerging threats is unprecedented. At the same time, the growing number and diversity of endpoints in the enterprise is expanding the network edge to the point of disappearing. Both these trends will continue with ongoing bring your-own-device (BYOD) initiatives and explode with the emerging Internet of Things (IoT).
Tags : 
cyber crime, security compromise, software management, information security, it management
    
IBM

5 Strategies for More Effective Performance Reviews

Published By: Cornerstone OnDemand     Published Date: Jul 28, 2017
Yearly Talent Evaluations are a Mix of Three Elements: 1) HR chasing down managers and employees to submit their reviews 2) managers rifling through months of hastily-written sticky notes, and 3) nervous employees sweating over how to reduce the last 12 months to a quick meeting. This strategy is ineffective and doesn’t reflect the needs of the modern worker. Check out five new trends that deliver more meaningful, engaging performance evaluations that lead to tangible workforce growth.
Tags : 
human resources, performance reviews, talent evaluation, efficiency
    
Cornerstone OnDemand

Cisco 2015 Annual Security Report

Published By: Cisco     Published Date: Feb 17, 2015
The Cisco 2015 Annual Security Report, which presents the research, insights, and perspectives provided by Cisco® Security Research and other security experts within Cisco, explores the ongoing race between attackers and defenders, and how users are becoming everweaker links in the security chain.
Tags : 
cisco, security, report, 2015, threat, intelligence, capabilities, benchmark
    
Cisco
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.