Continuity planning has significant value to offer besides risk reduction; sadly, the benefits are rarely talked about.
As awareness of SharePoint access control complexity grows, organizations are are focusing on security and compliance for their SharePoint deployments. We offer best practices to address these concerns.
Why hardware-based protocol analyzers are worth the extra cost and are superior to those based in software.
Experts say a recent accord between Fortify and HP augurs the advent of a new approach to vulnerability detection.
Where should IT start when trying to do more within new (and tight) budget constraints?
IT spending is under the microscope. How do you know you’re making the best investment decisions for network and server infrastructure? Business service management may be the answer IT and business users need.
Spam levels surged in May, but technologies such as traffic and connection management helped reduce or rein-in the volume of malicious traffic.
There's a significant disconnect between IT and business executives when it comes to disaster recovery preparedness.
How IT can continue to offer the same (or similar) levels of service on severely restricted budgets?
Administrator rights let users do everything on a system, but these rights are also the target of malware and other vulnerabilities.
The mainframe already embodies a viable proof-of-concept for cloud computing in the enterprise. Is it a cloud platform par excellence?
Building a business continuity plan is an ongoing job, but mature technologies exist that meet the range of key requirements.
MapReduce can help spread the computational chores between many computers. But what if the technology could be unleashed for all data, not just file-based data processing?
Threats delivered through the Web are increasing in number and severity. A Web filtering solution can reduce an enterprise’s vulnerability.
Mainframe operators know which controls to implement, but auditors -- who frequently come from the distributed side of the divide -- don’t.
Proper planning that includes addressing security will help you reap the benefits of virtualization and satisfy those who ensure business continuity and protect corporate data.
A recent report by AirTight Networks finds financial services firms are all but throwing out a welcome mat to wireless attacker
P2P file sharing is on the rise, and so are its risks. We show you five tips that can help you select a secure enterprise file-transfer solution.
To effectively address new security challenges, IT organizations need to tighten coordination and integration between security.
How to avoid the top mistakes when managing uptime performance, and how you can maximize system availability.