China serves as a shining example of the side effects of massive computerization. New users buy computers but don't know how to use them safely.
How to create and maintain an effective security program through auditing.
Wireless networking has a new weakness, according to a new research paper. The problem is with Wi-Fi Protected Access (part of the 802.11i standard) and the way it uses pre-shared keys.
Security vendor Symantec offers best practices for staying in compliance with the Gramm-Leach-Bliley Act.
Though 96 percent of techies say they want to work from home at least part time, (according to a techies.com survey), their top priorities are much different. IT workers are influenced much more by f
One leading research firm says that enterprises need to actively investigate their reporting solutions and determine whether they comply with three key areas of Sarbanes-Oxley legislation.
In a seemingly endless series of leapfrogging announcements, HP reveals record-breaking server performance over IBM
Automation is the real key to real-time infrastructure, and today’s infrastructure is anything but real time. The solution: Gartner analysts tout a technology vision that centers on a dynamic, two-way relationship between IT and business processes. Gartner also identified three technology triggers required to achieve this new business process fusion.
Novell's track record with high-profile acquisitions is spotty, but users we spoke to believe IBM's $50 million investment in Novell is encouraging.
Analyst firm says the waiting is over: IT spending is about to come back into line after two horrible years of IT budget declines.
A new supercomputer with blistering performance of 60Teraflops running on standard Intel x86 processors?
MAKO is a slimmer, more elegant, and more capable implementation of their existing technology that combines several new architectural features that make it worth a look.
A newcomer dominates this month's list
A new report from McAfee examines European companies' vulnerabilities.
Six modules in Computer Associates' new eTrust Identity and Access Management Suite, used in any combination, provide an integrated solution to managing identities, from provisioning to enforcement.
The company's VP of technology weighs in on integrating security able to scale rapidly and fail well.
Administrators can use Tivoli Management Portal to establish performance thresholds and drill down into the root cause and context of a system failure.
DBXray lets administrators manage multiple database platforms residing on distributed and mainframe systems from a single console
New services and technology offerings from Big Blue help companies comply with Sarbanes-Oxley and other complex regulations.
A recent survey from Aberdeen Group finds that many IT organizations are receiving a failing grade in Sarbanes-Oxley compliance in one key area: asset management. The research firm found that a majority of senior managers are unaware of -- or are otherwise ignoring -- Sarbanes-Oxley regulations that pertain to the subject.