While many small and medium-size companies fear spyware, they don’t think spyware infections can happen to them. Despite highlighting viruses, worms, and spyware as top network security concerns, many don’t actively combat even one of these problems.
The only way to solve the seemingly intractable problems of storage management is to do so strategically.
What’s not to like about z/Linux and other cheap mainframe workloads?
Thanks to improved corporate information security practices, attackers are seeking new methods for accessing sensitive corporate information, putting storage media more at risk than ever. We offer several recommendations for destroying data.
Instead of embracing training as an investment in a savvy and innovative IT workforce, companies tend to view it as an encumbrance
After the largest known compromise of personal information, the FTC details the information security failures that helped caused it.
To succeed with knowledge management, organizations should focus on getting better at reinventing the wheel instead of avoiding it.
Even companies that have embraced next-generation mainframe workloads often give short shrift to the question of training. What gives?
How quickly can you search and retrieve e-mail and instant messages relevant to a regulatory inquiry or court-ordered discovery process?
Adding an imaging solution to your data-protection strategy can protect you from any type of data or server calamity.
Only by looking at data targets, then building security in pragmatic layers around the targets, can you realize strategic data security
IT is the epicenter of your company's nervous system. Capacity planning can keep it healthy. We examine planning methods and highlight their pitfalls.
IT managers look to better tools, including self-service retrieval for employees
Will 2006 be the year of endpoint security? A number of network-access-control approaches are finally coming to fruition.
As the first month of 2006 comes to a close, our curmudgeon of a storage analyst finds several companies deserve praise for their storage efforts.
Organizations may see service-enablement, and the next generation of SLAs, as a chance to improve the responsiveness and dynamism of their IT departments.
Despite the popularity of forensic science, automated, digital evidence-gathering and analysis tools lag.
In spite of their differences, mainframers seem to agree on a few important points, although even these may surprise you.
It’s worth remembering how much the employment outlook has improved in the last half decade—and how far we have still to go
Symantec anticipates kernel-level rootkits, and more covert channels for siphoning intellectual property