Auditing can do more than just help you meet a host of new government regulations. The author outlines the significant business benefits from a solid data-auditing program and explains the basic requirements of such a solution. (Part one of a two-part series.)
Companies turn to managed Service providers for help; desktops dominate security budgets as patches average $234 per machine.
Outsourcing efforts yield mixed results. Are CIOs are asking tough questions about the hidden costs?
Is a resurgence of big-ticket capital expenditures for infrastructure ahead?
Big Blue hopes to snare workloads from Unix, Windows as RACF morphs into z/OS Security Server
Readers sound off about recent comments from previous columns
Newest vulerabilities feed on old worm to take aim at Microsoft's Web site
Best practices in keeping the desktop secure
New Mydoom variants; Vulnerabilities in IE browser, Checkpoint products; January a banner month for threats.
Encrypting, monitoring, and auditing access to actual data
Keep these four key goals in mind to ensure your business/IT alignment strategy is a success
A study of over 1,000 data center administrators sheds light on how service level agreements are being used and the penalties imposed when performance falls short.
The open source Eclipse Foundation held its first-ever developer conference, where it announced its break from IBM and Sun said it might join after all.
A 37-year-old inventor holding 17 patents, with 30 more pending, talks about invention, innovation, collaboration, and patents.
Did EMC announcements threaten to drive the industry down the path it chose, or was the company just using reverse psychology to spur cooperation?
New legislation has failed to stem the tide of unsolicited e-mail, protecting e-mailers who follow the letter but not the spirit of the law.
The latest threats have companies reconsidering their anti-virus tools, wondering if AV is becoming irrelevant. Increasingly, companies are looking at application-level personal firewalls and all-in-one gateway hardware for PCs.
According to Forrester Research, one third of companies are currently using or piloting BPM products or services. The company's suggestions for matching your needs with the right BPM vendors.
Proponents say IM can function as XML message brokers between systems at a fraction of the cost of traditional messaging middleware; putting an IM interface on a back-end application can bring big benefits.