Security is more than just determining which users have access to applications and data. Compliance also isn't enough. What's needed is a risk-based approach to security -- a pro-active, prevention-oriented line of attack to keep your enterprise safe.
The top trends security administrators dealt with in 2012 and what's ahead in 2013.
More than half of all programmers moonlight -- as hobbyists, as contributors to open source projects, or, thanks to marketplaces like the AppStore, for fun and profit.
Although the zEnterprise EC12 probably won't match the record-breaking performance of its predecessor, it should provide a big boost to Big Blue's bottom line.
The top five areas where department heads and IT staff commonly clash.
Pay close attention to these five technology elements before moving to the cloud.
Is FTP losing out to file-sharing cloud services?
Which three trends had the biggest impact on IT in 2012, and which will affect IT the most in 2013?
Cloud computing, mobile applications, and big data coalesced in 2012 and will shape IT in 2013 and beyond.
Emphasis on loyalty rather than satisfaction may help explain why, today, it is rare to see brand-name vendors vying for top honors in rig performance, cost-efficiency, or power efficiency bake-offs.
Not surprisingly, big-data-a-la-Big-Blue has a distinctly dollars-and-cents flavor to it.
How should developers cope with software eating the world?
Those with definite plans to upgrade is half the rate of those planning to move to Windows 7.
Cut the cost and improve the accuracy of SAP system copy chores.
Five questions your business should ask of unified storage vendors so you don't have to compromise on performance, scalability, or cost efficiency.
How keyloggers work and spread, why anti-virus applications won't stop them, and how you can protect your enterprise.
The idea that machines will dominate human intelligence is mere science fiction today, but machines are getting better at complex decision making and active reasoning.
Your employees are comfortable with social networks. How can those networks be turned to your business advantage?
We can no longer rely on "security through obscurity" as more devices are Ethernet and wireless enabled.