Executive Briefings


Database Security Requires a Multi-Pronged Approach

Regulations are leading organizations toward automated database intrusion prevention, auditing, and encryption

Q&A: Security Best Practices Include Automated Remediation

Automated vulnerability remediation exists, but most companies still take a manual approach

Your Stake in Data Auditing - Part 2 of 2

What auditors and database administrators need to know

A Strategy for Improving Knowledge Work

In search of a strategy that can improve knowledge work just as industrial work was improved in the last century.

Your Stake in Data Auditing - Part 1 of 2

What CFOs and CIOs need to know

What's Ahead for Enterprise Anti-Spyware

Performance takes biggest hit from spyware today; look out for spyware working as a phishing aid

ITIL Compliance Supports Corporate Goals, Keeps Systems Running

Use of a standard IT governance model, such as ITIL, gives organizations specific information on how to improve IT disciplines related to service support and delivery.



Trends: Identity and Access Management Needed on Mainframes, Too

Phantom users and orphaned accounts are widespread in the distributed space, but things are even worse in the mainframe world

Regulatory Compliance: A Catalyst for Better Data Management

At Computer Associates, CTO Yogesh Gupta doesn't just talk about data management or regulatory compliance from an academic standpoint. He's living it

Q&A: The Software Licensing Lessons Vendors Don’t Want You to Learn

Almost every organization is over-invested in its software assets or paying for software it isn’t using. The trick is finding the how and the where

The Invisibility of Knowledge Work

In the digital world, bringing visibility to the process of knowledge work is the first step in making it more effective

Ignorance of Spyware in the Enterprise Still High

What happens when an organization with spyware problems can’t install anti-spyware software on every system?

Tips for CSOs: How to Discuss Security Issues with Executives

Many CSOs still have difficulty communicating security requirements to their more business-oriented peers.

Social Engineering Bypasses Information Security Controls

Identity theft draws media attention; phishing attacks skyrocket

Case Study: Rescuing a Hospital Drowning in Paper

How one hospital tapped DB2 Content Manager to drastically reduce its paper and printing costs—and realized other savings to boot

Corporate Security Awareness Grows but Funding Lags

Survey shows security managers still face budget battle

Scaling Without the Scramble

Understanding the four dimensions of scalability will help you successfully take XML and Web services-based SOAs enterprise-wide

Unraveling Common VPN Flaws

Chances are your VPN is vulnerable

The Tyranny of On-time and On-budget

Is delivering every project on-time and on-budget a worthy goal or a warning signal of deeper problems?

Case Study: Bypassing Performance False Alarms

How a prominent hospital was able to increase the productivity of its IT staff and pay for itself all in about two months