No single enterprise risk management framework is comprehensive enough to guide your company in meeting all of its compliance, governance, and risk management needs. Instead, you'll want to selectively combine standards by building around a central framework, such as COSO or AS/NZS 4360, and reinforcing it with one or more of these risk assessment standards.
IBM wouldn’t just give mainframe capacity away, would it? The short answer is: yes, it would—and it has.
Before unleashing sites and software, these products will spotlight code that can leave you vulnerable
In the first of a three-part series, we outline the evolution of workload automation technology.
Can the combined will of Microsoft, Cisco, and EMC overcome the ingrained inertia of government bureaucracy?
One company offers a way to secure data when different classes of data have different security requirements.
A close-up look at improvements to file sharing in Windows Vista
Non-traditional data sources provide value and opportunity for increased performance
China is fast rising up the rungs of the global outsourcing ladder.
Seagate’s announcement of Momentus drives with DriveTrust technology holds promise for enabling IT to secure data at rest
IT can choose from a variety of techniques to reduce its mainframe software costs
Secure Sockets Layer encryption presents a tradeoff between keeping data private and allowing for network monitoring and the detection of intruders. The solution: transparent SSL proxies.
If you do your homework, Big-Iron cost cutters argue, you can realize substantial mainframe software savings.
Securing SOA and Web services poses challenges for IT administrators. We look at several best practices and suggest how organizations should manage the transition to SOA and Web Services from a security perspective.
While there is no magic formula to ensure a project’s success, our four recommendations can help you address the common project issues with a combination of people, processes, and tools.
The best place for tape-based data encryption may well be on the media itself, but until key management issues are worked out, the strategy binds you to a particular vendor’s key management system for the foreseeable future. Our storage analyst, Jon Toigo, takes a closer look.
Ohio State University’s CISO Charles Morrow-Jones looks at the cost of guarding against breaches, plus a best practice for all IT shops.
Big Blue announces new consolidation and security products as part of its $100 million mainframe simplification and modernization effort
The updated Systems Director could be a hot ticket for many System p and System i customers.
Ohio State University’s CISO Charles Morrow-Jones explains how the distributive, collaborative environment of a university affects security.