From centralization to support for standards, these encryption key management and data security best practices can help you protect your organization’s confidential data and comply with regulatory mandates.
Vendors offer their opinions on staying out of legal hot water to where to expand the use of de-duplication technologies.
Gartner looks at an open letter destined for next year’s G-8 summit
By now, IT and its line-of-business customers should have perfected the art of service level management. The opposite is the case, however.
Firewalls and other technologies no longer adequately protect application code.
Firefox 3.0 release highlights the perils of information technology celebrity
What training do developers need and how do you get executive buy-in?
Salary growth is flat, and IT hiring is primarily limited to plugging gaps. Shops are cutting back on -- or eliminating -- discretionary spending, too.
We discuss the types of de-duplication and what meaningful criteria should be used to evaluate competing approaches and products
If you're in the market for a non-mainframe mainframe replacement, HP might have just what you need….
There’s more to virtualization than just getting the most from your server hardware.
Outsourcing megadeals appear to be on the decline; does this mean that outsourcing itself is on the way out?
A security researcher announces a new Threat Forecast service that aims to keep security chiefs at least one step ahead of the bad guys
If Green Software is to have an impact, the software industry as a whole needs to get onboard
These three steps can help you establish a "reality-based" risk mitigation plan
How do you ensure that your encryption solutions effectively secure all your sensitive data?
CA touts a visual spin -- in a 3270 interface -- on ESCON and FICON management.
With more than 100 million Web applications deployed in the world, perhaps fewer than 5 percent of are being tested for security vulnerabilities. We offer three simple steps to help you secure your Web applications.
The enterprise OS-scape could experience disruptive shocks during the next five years
Putting the cart before the horse: does cloud computing sell, and -- if so -- who's buying?