Executive Briefings


Q&A: IT in Denial over Spyware

While many small and medium-size companies fear spyware, they don’t think spyware infections can happen to them. Despite highlighting viruses, worms, and spyware as top network security concerns, many don’t actively combat even one of these problems.

Getting Started on Data Management

The only way to solve the seemingly intractable problems of storage management is to do so strategically.

The Mainframe Capacity Conundrum: Getting Better All the Time

What’s not to like about z/Linux and other cheap mainframe workloads?

Destroy, Shred, Disintegrate: Guidelines for Securely Decommissioning Storage

Thanks to improved corporate information security practices, attackers are seeking new methods for accessing sensitive corporate information, putting storage media more at risk than ever. We offer several recommendations for destroying data.

As the World Trains (Revisited)

Instead of embracing training as an investment in a savvy and innovative IT workforce, companies tend to view it as an encumbrance

Forty Million Stolen Identities Later: Learning from CardSystems' Breach

After the largest known compromise of personal information, the FTC details the information security failures that helped caused it.

Get Better at Reinventing the Wheel

To succeed with knowledge management, organizations should focus on getting better at reinventing the wheel instead of avoiding it.



Training: Commitment to IT Pros Still Low

Even companies that have embraced next-generation mainframe workloads often give short shrift to the question of training. What gives?

Q&A: Balancing E-Mail Security and Compliance

How quickly can you search and retrieve e-mail and instant messages relevant to a regulatory inquiry or court-ordered discovery process?

Imaging: Simple Data Protection in a Complex IT World

Adding an imaging solution to your data-protection strategy can protect you from any type of data or server calamity.

Storage Security is Nothing New

Only by looking at data targets, then building security in pragmatic layers around the targets, can you realize strategic data security

Maximizing the Benefits of Capacity Planning

IT is the epicenter of your company's nervous system. Capacity planning can keep it healthy. We examine planning methods and highlight their pitfalls.

Corporate E-Mail Security: Compliance Swamps IT Staff

IT managers look to better tools, including self-service retrieval for employees

The Shape of Endpoint Security to Come

Will 2006 be the year of endpoint security? A number of network-access-control approaches are finally coming to fruition.

A Few Bright Spots in Storage as 2006 Unfolds

As the first month of 2006 comes to a close, our curmudgeon of a storage analyst finds several companies deserve praise for their storage efforts.

SOA’s Impact on SLAs: Trouble Ahead

Organizations may see service-enablement, and the next generation of SLAs, as a chance to improve the responsiveness and dynamism of their IT departments.

Computer Forensics: Still in the Stone Age

Despite the popularity of forensic science, automated, digital evidence-gathering and analysis tools lag.

State of the Mainframe (First in a Three-Part Series)

In spite of their differences, mainframers seem to agree on a few important points, although even these may surprise you.

Careers: IT Employment Rebounds

It’s worth remembering how much the employment outlook has improved in the last half decade—and how far we have still to go

Q&A: The 2006 Threat Landscape

Symantec anticipates kernel-level rootkits, and more covert channels for siphoning intellectual property