Mobile devices are bombarded by direct attacks and those designed for any Web-connected device. We explain best practices for end users and best practices for IT that can protect against these attacks.
Attackers are reducing traditional mass-spam phishing campaigns in favor of targeted or spearphishing attacks.
These 10 best practices examine key business integration tasks that are critical to building deeper connections with customers and trading partners.
Piecemeal efforts only resolve some threats while burdening IT resources. Enterprises need to take an entirely new perspective for managing mobile security.
Cloud computing is a popular architecture, and U.S. agencies are finally getting on board.
Two and a half years on, CA says it has substantially delivered on its Mainframe 2.0 vision.
If you're thinking about ceding control of some applications to others, this four-step recipe can help you create and enjoy a successful and safe relationship.
Business process management and complex event processing now support a broad range of business processes. How can these two technologies complement each other to further optimize business processes?
In the age of the cloud, applications and content are only as good as the network they ride on. We explore three application acceleration options.
Automated testing tools can relieve the tedium of testing, but are they appropriate for every testing task?
NetView 6.1 is, by almost any standard, an exciting new deliverable -- particularly for users of IBM’s Geographically Dispersed Parallel Sysplex technology.
Tape is currently enjoying a renaissance in data storage. Speakers at the third Global IT Executive Summit shed light on what's ahead.
Malware-makers have a powerful new tool: a spam bot that infects both PC and Mac platforms -- with support for Linux and iPad operating systems in the works.
There are few bright spots in a new survey of CIO hiring plans.
Stuxnet, a high-profile cyberattack, used malware signed with legitimate code-signing certificates. What went wrong and how can you protect your own assets?
Business and IT executives aren't always on the same page when it comes to virtualization and cloud computing.
What’s holding back some enterprises from enjoying the benefits of cloud computing?
Best practices for keeping mobile devices safe.
With another strong quarterly showing for System z, IBM seems to have put its recent run of mainframe woes behind it. Or has it?
Although clouds may never provide a truly carefree lifestyle when it comes to resources, these steps can ensure that they don’t create an expensive operational nightmare.