-
Bring-your-own-device approaches can be a nightmare for security administrators. Identity-based security can help eliminate risks posed by mobile hardware.
-
By
IAI is a new approach to the problem of identifying unauthorized user behavior that augments other types of security products and processes. Here's how it works.
-
By
By proactively managing new technology implementations and fully understanding the old IT environment, your organization can meet end-user expectations faster while managing the overall impact to your network.
-
By
Hack reveals lack of basic security standards.
-
By
According to a new survey, some companies lose up to 75 percent of their security devices.
-
By
Survey reflects shift in backup/recovery priorities.
-
By
More than half of respondents aren’t considering continuous firewall compliance; more than one in ten never perform firewall audits.
-
By
A look at the true cost of compliance failures and how to avoid being buried in trouble.
-
Think printing is just for creating hard-copy reports? Think again.
-
RTM in August foretells Fall availability of two key Microsoft products.
-
In the 1990s, tape fell out of favor, but on the 60th anniversary of this technology, it's finding a reversal of fortune.
-
By
MagicJack PLUS and NetTalk DUO WiFi provide surprisingly good voice quality, plenty of features.
-
By
Dimension Data report warns that BYOD, video, and virtualization are shortening network life expectancy.
-
By
Traditional deep packet inspection may no longer be able to protect your environment. We look at a new approach -- deep content inspection.
-
As the buzz over big data grows, what's changed in the last year? How has machine-generated data changed the way IT tackles big data?
-
By
These steps will help you begin building and executing a defensible deletion strategy.
-
By
Data integration between applications remains biggest challenge.
-
By
Two-thirds of senior managers are in the dark about where their company data resides; more than one in ten enterprises have no plans to manage cloud-based storage services.
-
-
By
Researchers find "video protocols were surprisingly unstable," exposing consumers to a variety of potential threats.
-
By
Outbreak of Trojan.Milicenso sends printers into spasms.
-
By
Security breaches, data loss could increase with popularity of online file sharing.
-
By
However, use doesn't mean social media is part of the company's overall strategy.
-
By Stephen Swoyer
Don't know how to get started with your big data project? BI start-up Cirro claims to have just what you're looking for.
-
By James E. Powell
Big data is changing the competitive dynamics of the BI industry. We explore how everything from sensor data to social media to mobile BI is changing the very nature of big data.