Although many details are unknown, TJX’s breach reminds us once again that a lack of security can cost dearly.
As with everything else in IT, performance is a key consideration when selecting a backup solution. Finding a reliable measure, however, is problematic.
In our rush to adopt new technologies, we sometimes forget old disciplines that supported rigorous software development. Here are five rules that can help IT reduce the risk of failed SOA initiatives.
Why Compuware’s application-lifecycle toolset helps set it apart from competitors
Despite considerable work on improving security, “old, errant code” exposes flaw in Microsoft Vista.
How can an enterprise manage the influx of security events in both physical and IT silos that have traditionally operated independently but are now coming together? We offer seven suggestions.
The move will likely have mixed impact on most CA customers, although mainframe shops should expect some benefits
In compliance, a focus on technical security can eclipse human factors. Particularly in IT compliance, a focus on technical security tends to eclipse human factors, with serious compliance implications. Good training programs need to be measured, controlled, and incorporate feedback loops so that the people responsible for the rulemaking getinput from the enforcers and (more importantly) from the employees who are subject to them.
End- user experience management is becoming an important component for ensuring the success of Web-based applications.
Can non-native archive management software improve the performance of the e-mail server by automatically archiving messages without user intervention?
If you have an AS/400 or iSeries, PowerTech Group wants you to update your security model—and a recent study suggests you should pay close attention
Center will focus on SOA development, education
Industry analysts at Gartner say forward-thinking companies must develop what they call a “Chindia” strategy
Fundamental Software has run smack up against Big Blue’s refusal to sanction 64-bit mainframe emulation
Mobile data management: a risk vs. reward scenario for business. Mobile data management presents a classic risk vs. reward scenario for business. While mobile devices are all but essential for many aspects of business, the risk of lost or stolen data is significant. Learn how companies are controlling the risk around these proliferating devices by assessing critical areas of mobile data management.
Even as IBM and Fundamental continue to wrangle, FLEX-ES shops are dwelling in a kind of limbo. First in a series.
Network access control—or entitlement control, as Securent calls it—is all about authentication, access, and authorization.
The deal helps position Software AG as an ascendant SOA player in both North America and the EU
Network access control is a hot topic, and there’s more clarity than marketing hype about the technology. We look at the basics of NAC and where it’s headed.
A security vulnerability in AJAX-based applications will challenge development teams but is unlikely to slow AJAX’s rapid growth.