Enterprise


Q&A: Best Practices for Avoiding Mobile Malware

Mobile devices are bombarded by direct attacks and those designed for any Web-connected device. We explain best practices for end users and best practices for IT that can protect against these attacks.

Spearphishing on the Rise

Attackers are reducing traditional mass-spam phishing campaigns in favor of targeted or spearphishing attacks.

10 Best Practices to Build Deeper Business Connections

These 10 best practices examine key business integration tasks that are critical to building deeper connections with customers and trading partners.

A New Approach to Mobile Encryption

Piecemeal efforts only resolve some threats while burdening IT resources. Enterprises need to take an entirely new perspective for managing mobile security.

Q&A: Why Government Agencies Are Finally Moving to the Cloud

Cloud computing is a popular architecture, and U.S. agencies are finally getting on board.

Mainframe 2.0 at 2.5

Two and a half years on, CA says it has substantially delivered on its Mainframe 2.0 vision.

4 Steps to Successful Application Managed Services

If you're thinking about ceding control of some applications to others, this four-step recipe can help you create and enjoy a successful and safe relationship.



Q&A: Why Business Process Management and Complex Event Processing Are Better Together

Business process management and complex event processing now support a broad range of business processes. How can these two technologies complement each other to further optimize business processes?

Application Acceleration in the Cloud Age

In the age of the cloud, applications and content are only as good as the network they ride on. We explore three application acceleration options.

Q&A: Automating Application Testing

Automated testing tools can relieve the tedium of testing, but are they appropriate for every testing task?

Analysis: Revamped NetView a Sleeper Hit

NetView 6.1 is, by almost any standard, an exciting new deliverable -- particularly for users of IBM’s Geographically Dispersed Parallel Sysplex technology.

Are You Ready for "iTape"?

Tape is currently enjoying a renaissance in data storage. Speakers at the third Global IT Executive Summit shed light on what's ahead.

New Malware Attacks Both PCs and Macs

Malware-makers have a powerful new tool: a spam bot that infects both PC and Mac platforms -- with support for Linux and iPad operating systems in the works.

Careers: Steady as She Goes

There are few bright spots in a new survey of CIO hiring plans.

Best Practices for Securing Private Keys and Code-Signing Certificates

Stuxnet, a high-profile cyberattack, used malware signed with legitimate code-signing certificates. What went wrong and how can you protect your own assets?

IT, Executives Don't See Eye to Eye on Virtualization, Cloud Computing

Business and IT executives aren't always on the same page when it comes to virtualization and cloud computing.

Q&A: Overcoming Cloud Migration Fears

What’s holding back some enterprises from enjoying the benefits of cloud computing?

Q&A: Preventing Mobile Vulnerabilities

Best practices for keeping mobile devices safe.

Analysis: Do zEnterprise Results Signal a Slowdown for the Mainframe Market?

With another strong quarterly showing for System z, IBM seems to have put its recent run of mainframe woes behind it. Or has it?

Avoiding Buffet-Style Overindulgence in Your Internal Cloud

Although clouds may never provide a truly carefree lifestyle when it comes to resources, these steps can ensure that they don’t create an expensive operational nightmare.