-
IAI is a new approach to the problem of identifying unauthorized user behavior that augments other types of security products and processes. Here's how it works.
-
Hack reveals lack of basic security standards.
-
According to a new survey, some companies lose up to 75 percent of their security devices.
-
More than half of respondents aren’t considering continuous firewall compliance; more than one in ten never perform firewall audits.
-
Survey reflects shift in backup/recovery priorities.
-
In the 1990s, tape fell out of favor, but on the 60th anniversary of this technology, it's finding a reversal of fortune.
-
A look at the true cost of compliance failures and how to avoid being buried in trouble.
-
Think printing is just for creating hard-copy reports? Think again.
-
The market has shown that desktop virtualization needed to be simplified. With the evolution of new VDI-in-a-Box solutions, it will be.
-
RTM in August foretells Fall availability of two key Microsoft products.
-
For most organizations, choosing between Big Blue's two hybrid computing visions is simple, but what about shops that need both? That's where it gets tricky.
-
What should a CIO consider when moving to Paas? What criteria should the CIO use, and what misconceptions about the cloud must be overcome?
-
MagicJack PLUS and NetTalk DUO WiFi provide surprisingly good voice quality, plenty of features.
-
Dimension Data report warns that BYOD, video, and virtualization are shortening network life expectancy.
-
As the buzz over big data grows, what's changed in the last year? How has machine-generated data changed the way IT tackles big data?
-
These steps will help you begin building and executing a defensible deletion strategy.
-
Data integration between applications remains biggest challenge.
-
Two-thirds of senior managers are in the dark about where their company data resides; more than one in ten enterprises have no plans to manage cloud-based storage services.
-
Traditional deep packet inspection may no longer be able to protect your environment. We look at a new approach -- deep content inspection.
-
-
Researchers find "video protocols were surprisingly unstable," exposing consumers to a variety of potential threats.
-
Outbreak of Trojan.Milicenso sends printers into spasms.
-
Security breaches, data loss could increase with popularity of online file sharing.
-
However, use doesn't mean social media is part of the company's overall strategy.
-
Big data is changing the competitive dynamics of the BI industry. We explore how everything from sensor data to social media to mobile BI is changing the very nature of big data.