Architecting fine-grained access to Web Services for many users at multiple organizations is difficult to implement or audit using identity management software. We discuss alternatives.
Bluetooth Attack Compromises PINs, New Smart Phone Malware, Charting the E-mail Security Market
How organizations can get (and stay) compliant while spending less
Implementing a preventive methodology helps establish a solid infrastructure, raising the outsourcing organization's accountability, forcing them to write better code
Unisys, creator of the first Intel “mainframe,” announced a capacity-on-demand service for the x86 and IA-64 set
Few users think Sun’s stewardship will be a good thing for StorageTek or its customers
IT hiring activity looks to be on the rise, but IT compensation levels are stagnating.
Backups do fail. ServerGraph provides a troubleshooting tool to track down and help you solve problems.
Will security flaws dent Mozilla's status as a trusted alternative to Internet Explorer?
Microsoft Updates XP WiFi Security, Worm Goes Right-Wing
The need to protect its IM users from outside attacks, spam, and regulatory requirements leads Kansas’ largest electric utility to adopt IM monitoring software.
For the first time, factory revenues for Unix and Windows servers were equal
IBM’s flagship xSeries server demonstrates how far Intel servers still have to go to reach feature and function parity
For the first time in years, Sun looks like the cagey, competitive, and iconoclastic competitor of old
New tools previously unavailable on mainframes can now enable native, simplified, cost-effective data integration with increased reliability, scalability and performance.
CA Antivirus Vulnerabilities; AOL Patches New Netscape; Beware Phishing E-mails Bearing Keylogging Software; New Trojan Encrypts PCs
Is enterprise content management the next new panacea?
The differences between signature-based, access control, and intrusion prevention products
While operator errors get blamed for the majority of security incidents, organizations aren’t budgeting a fix.
Some suggest that BRM is just a crazy notion in a technology utopia