Enterprise


Case Study: Virtual Patches Defend Web Applications

Web-application firewalls protect against unknown attacks

Q&A: Preventing “Applications Gone Wild”

Software can establish a baseline of "normal" application activity, then sound the alarm when an app behaves erratically

Careers: Are You a Security Conservative, Gloryhound, or Gambler?

The security solution you choose has important implications for your company and your career.

In Brief

CSOs concerned by malware and regulations; top IM security predictions; Eudora vulnerability

Five Steps to Data Quality in Enterprise Mergers

As merger and acquisition activity picks up this year, there will be an even heavier emphasis on the quality of data combined from the two enterprises

Careers: Combating Business-Process Change Overload

Compromise may be possible—even within the most control-oriented of corporate cultures

BMC Cuts False Performance Alerts to Zero

BMC says its new performance-monitoring software can help reduce false alerts—and sleep-shattering beeper pages—by almost 100 percent



Careers: Job Openings Grow, Worker Satisfaction Highest Ever

Workers are increasingly optimistic about their job security—and job satisfaction has increased to unprecedented levels

Data Migration Headaches Underscored by Softek Survey

Some people don’t believe in making numbers just fit the bill; they ask at the source and tell it like it is.

Control Systems Leave Manufacturers Vulnerable

Manufacturers' inability to patch their computers against every newly discovered virus and worm leaves their systems highly exposed

Putting Next-Generation Smart Cards to Work

Two trends are driving the growth of digital signatures for sign-off and revisions of digital documents

In Brief

Security hiring growth slow but steady; end-users blame ISPs and product vendors for spam

Lotusphere 2005: Notes, Domino, and Workplace Take Center Stage

Long-time Notes and Domino customers regard Workplace with suspicion—and IBM is still having trouble positioning the relationship between the two platforms

Sun Outlines Open-Source Plans

A new software license gives OpenSolaris a good foundation—even if Sun hasn’t worked out all the legalities of porting CDDL code to Linux

CICS: The Old Workhorse Keeps on Kicking

Big Blue’s durable workhorse still has plenty of kick left in it. And customers, for that matter, are increasingly willing to deploy it in support of new workloads

Avamar’s Value Now Patently Obvious

Finally, after nearly six years, Avamar Technologies has received the third of the 22 patents it has applied for.

Defection to More-Secure Browsers? Don't Bet On It

With more-secure browser alternatives now available, will IE go by the boards?

Top 10 Data Center Dangers

Many organizations skimp on maintaining health data centers, putting security at risk

Top 5 GPO Trouble-Causing Settings

Group Policy settings control almost every aspect of a computer from a central location, but incorrect settings can cause serious problems for clients and servers within the domain. We explain how to avoid problems from these error-prone settings.

In Brief

2005 security growth areas, tricking code to reveal its flaws, and a mobile-phone virus gets legs