To succeed, a chief information security officer needs project management skills, business process expertise, a budget, and authority—and an aptitude for diplomacy.
Just think of it: routers and switches no longer need separate firewalls, IDS/IPS appliances, or other security technologies to shield themselves from attacks. Fewer boxes to maintain, fewer management systems to support—what’s not to like? As it turns out, plenty.
Our storage guru Jon Toigo has always been suspicious of industry awards. Rather than looking at slick literature, Jon evaluates dozens of products each year to find what's worthy of your consideration. Here are the Toigos for 2005.
If you think you’ve got a lot more on your plate these days, you’re probably right
With its better-than-spreadsheet-spreadsheet marketing strategy, Actuate could find an eager audience for its FPM tool.
What really happened—and where does Firstlogic go from here?
Will BPM and ETL ride to mainstream success on the coattails of Microsoft’s SQL Server 2005 juggernaut?
How can IT—which takes 4.5 of a company's revenue—show itself to be a positive force on the company's bottom line?
Giving mobile users access to enterprise applications and internal portals via an SSL VPN can be tricky. Midwest Wireless' implementation was exceptionally smooth. What's their secret?
IT has experienced relatively healthy job growth in the U.S. during a period when job growth as a whole remained stagnant