Regulations are driving companies to audit their security logs. To help collect and analyze all that data, companies can turn to free syslog software and off-the-shelf security event management software. Which approach is right for you?
The Ubuntu GNU/Linux distro launched on June 1 was designed specifically with large organizations in mind, says the open-source project's founder.
How to evaluate the security of applications you build or buy, and justify those requirements to senior management.
Thanks to reduced unemployment and a graying workforce, we could be on the verge of a war for top IT talent. That bodes well for mainframe pros.
Equal parts architecture and marketecture continue to dominate the releases coming out of the storage industry.
No backup plan is complete without protection for remote sites. We explore challenges, best practices, and agentless technologies.
Changes target regulatory compliance, auditing, and access controls
A federal regulation forced a medical center to lock down privacy, which coincidentally increased savings.
IBM and Microsoft made significant data management-related announcements last week
Best practices for testing composite and distributed applications
Most college Web sites lack online privacy policies. What does that say about their ability to secure people’s private information and to avoid data breaches?
With the revitalization of the mainframe and the rise of zNextGen, SHARE itself has been revitalized. (First in a series)
Not being business savvy could become a resume liability as time goes by
Vista’s arrival will shake up the $3.6 billion Windows security market. Here are the implications for IT managers.
Storage consolidation into a SAN is often a code word for re-centralization, a strategy based more on nostalgia than necessity—or benefit.
Five key measures to monitor to address infrastructure problems.
How this popular consumer tool fits in the enterprise
Far from expanding their use of that DBMS, analysts argue customers need to start planning their migrations now
Microsoft moves to patch a “zero-day” Word vulnerability. Meanwhile in a first, a new worm arrives bearing its own browser—the better to launch drive-by download attacks.
Learn how you can retain and extend the value of your mainframe applications