When disaster strikes and victims flood into an emergency room, doctors conduct triage to determine the severity of injuries and who gets treatment first. Companies can similarly prepare for the inevitable data breach by building a cross-disciplined incident team trained to assess the damage, stop the bleeding, and respond appropriately to regulatory bodies and customers.
To reverse the rise of Web-application vulnerabilities, enterprises must patch more than just their operating systems.
Health insurance provider balances valuable mainframe logic against need for more manageable system
In many companies, developers use live data in unsound, test environments but remain unmindful of the fallout if that data leaks out. Why should your compliance guard be relaxed when developers use test data to design the systems that store and dole out access to such sensitive information? Here are five ways to manage test data in regulated environments.
Expect storage demands to spike during the holidays. Here’s how to get control.
Those who have built and deployed successful SOA projects know it’s all about meeting business needs.
Is a software-only solution to storage manipulation on the horizon?
Some mainframers think IBM’s $100 million could be better spent addressing training, licensing, and other long-standing Big-Iron pain points
Customers can service-enable terminal-based applications and effectively transform them into full-fledged SOA assets
A new encryption solution promises to keep employees honest and reduce the number of enterprise "insiders."
How to get even more oomph out of IBM’s zIIPy new DB2 processor engine
IBM is putting its money where its mouth is—spending $100 million over the next five years to make its mainframe systems easier to use
Three key features IT should look for when shopping for a UTM solution.
New vendors trumpet products with lower price tags, but if they lock you into a single source, what’s the point?
All APM solutions are not created equal.
Two companies have teamed up to simplify creating voice-enabled applications
ITIL emerged from an effort to establish better coordination and service-level controls over IT infrastructure within the British government. It’s certainly changed since then.
Nearly four-fifths of Chinese developers have experienced a security breach of some kind in the last 12 months, while non-U.S. developers are taking the lead with AJaX.
EdgeSecure makes it easier to protect data stored in remote locations.
Business process applications ensure that enterprise applications match business needs.