Enterprise


Ten Business Benefits of Effective Data Auditing

Auditing can do more than just help you meet a host of new government regulations. The author outlines the significant business benefits from a solid data-auditing program and explains the basic requirements of such a solution. (Part one of a two-part series.)

Top Three Security Problems Remain Despite Increased Spending

Companies turn to managed Service providers for help; desktops dominate security budgets as patches average $234 per machine.

Careers: Offshore Outsourcing Discussions Heat Up

Outsourcing efforts yield mixed results. Are CIOs are asking tough questions about the hidden costs?

An End to the Bandwidth Glut?

Is a resurgence of big-ticket capital expenditures for infrastructure ahead?

IBM Announces New z/OS Multilevel Security

Big Blue hopes to snare workloads from Unix, Windows as RACF morphs into z/OS Security Server

Reader Mail: Fear and Loathing in SMI-S

Readers sound off about recent comments from previous columns

MyDoom Details from Kaspersky Labs

Newest vulerabilities feed on old worm to take aim at Microsoft's Web site



Solving the Patch Management Headache

Best practices in keeping the desktop secure

Briefs

New Mydoom variants; Vulnerabilities in IE browser, Checkpoint products; January a banner month for threats.

Beyond Perimeter Defense: Securing Online Transactions

Encrypting, monitoring, and auditing access to actual data

When Worlds Collide: Getting Business and IT on the Same Page

Keep these four key goals in mind to ensure your business/IT alignment strategy is a success

Survey: SLAs Ratchet Up Pressure on IT

A study of over 1,000 data center administrators sheds light on how service level agreements are being used and the penalties imposed when performance falls short.

EclipseCon Wrap-Up

The open source Eclipse Foundation held its first-ever developer conference, where it announced its break from IBM and Sun said it might join after all.

Q&A: The Making of a Master (Technology) Inventor

A 37-year-old inventor holding 17 patents, with 30 more pending, talks about invention, innovation, collaboration, and patents.

Historical Fact or Historical Revisionism?

Did EMC announcements threaten to drive the industry down the path it chose, or was the company just using reverse psychology to spur cooperation?

Can-Spam, Laced with Loopholes, Creates Confusion

New legislation has failed to stem the tide of unsolicited e-mail, protecting e-mailers who follow the letter but not the spirit of the law.

Companies Defect as Anti-virus Software Struggles with Worms

The latest threats have companies reconsidering their anti-virus tools, wondering if AV is becoming irrelevant. Increasingly, companies are looking at application-level personal firewalls and all-in-one gateway hardware for PCs.

Business Process Management: Are You Looking at the Right Products?

According to Forrester Research, one third of companies are currently using or piloting BPM products or services. The company's suggestions for matching your needs with the right BPM vendors.

Exploiting IM for Back-End Systems Communications

Proponents say IM can function as XML message brokers between systems at a fraction of the cost of traditional messaging middleware; putting an IM interface on a back-end application can bring big benefits.