Despite increased security spending, the number of security breaches also increases. Plus, how Trojan applications have displaced worms and viruses as top threats—and why.
Thanks to immature standards, competing protocols, and nascent products, keeping VoIP secure isn’t easy. Here’s where to start.
IT must acknowledge the importance—and risks—of mobile computing tools and start building processes to protect corporate data.
The cost of distributed complexity—which is also measured in air conditioned BTUs and kilowatts per hour—is about to get even more expensive
How do we manage the combined output of all of the event logs produced by all the available, and frequently used, management tools?
Trying to reconcile the technologies and products offered by the storage industry with the actual problems confronting IT can seem like a thankless job.
New anti-spyware functionality highlights the enterprise security question: should you go for best of breed or opt for a security suite?
Best practices to keep mobile and remote users safe
The mainframe is entrenched for the long haul, respondents say
Experts predict imminent SEM market consolidation. The upside: lower software costs, easier usability, and improved efficiency. Even so, users will be faced with a dizzying array of options.
A growing number of mainframe pros are trying to educate their colleagues and C-level executives about the business case for Big Iron.
The full potential of tools to support knowledge work remains unrealized
Businesses need to be agile. An interconnect-driven server architecture may help. Here’s how.
A new study shows spyware is the fastest-growing threat to enterprises.
Eight best practices to keep the user experience front and center during IT migration projects.
Data management should stand on its own as an umbrella effort driving all of IT’s efforts, because the essential task of IT is data management.
When is an economic recovery not an actual recovery? When it benefits the few at the expense of the many.
Dealing with an e-mail worm targeting a Web application, and a vulnerability in IBM DB2. Plus, how to create a performance metrics program.
A future of reusable services got a step closer to reality last week when IBM announced its new SOA Business Catalog
Storage consumes as much as one-third of an IT budget, but getting information about storage (especially storage utilization) has been difficult at best.