-
By
SSD will soon be added to your disk and tape storage environment. It's time to start studying and planning for this evolution.
-
By
To understand how to counter stealth malware threats, you first need to understand the nature and sophistication of these attacks at each of their four stages.
-
By
Old technologies, economic issues threaten enterprise security.
-
By
From BYOD to social media, the trends that are keeping security administrators on their toes.
-
By
Make the most of your IT investments with these three tips to help you optimize your networks, applications, and clients.
-
Solution provides reporting capabilities.
-
Benefits, challenges, and best practices for incorporating a modular data center into your environment.
-
By
Management salaries rise; managers overseeing service-oriented architectures and business analytics shops command highest premiums.
-
By
Q2 2012 State of the Web report highlights dangers of out-of-date software, misdirection of “trustworthy sites.”
-
MED-V won't help you avoid Windows XP's expiring life cycle support, Microsoft says.
-
By
Co-location facilities, mirrored data, hot-standby servers -- data center managers are doing all they can to avoid the debilitating effects of power outages. Or are they?
-
Hardware migrations can be tricky. We discuss the keys to Kansas City Southern Railway's migration from mainframe to Linux.
-
By
With the proper process controls, you can now allow access for any class of device and "future proof" yourself from what comes next.
-
By
The key to protecting enterprise assets is to start with the right objective. We explore five steps you can take to shift your focus and tackle a new backup/recovery reality.
-
Main issue addressed: format problems with SQL Server reporting services.
-
By
Apple surges ahead; interest in Microsoft offerings tepid or falling.
-
By
In the right hands, a honeynet can be a powerful weapon in the war against advanced persistent threats. If you're contemplating adding advanced honeynets to your organization's arsenal, here are five things to consider.
-
By
These 6 action steps will help you get the most from outsourcing your remote infrastructure management.
-
U.S. firms are in a holding pattern, at least when it comes to IT hiring -- a departure from the first three months of the year.
-
By
Cost per record breached is highest in the U.S. and Germany, lowest in India.
-
By
BYOD is here to stay; ignore it at your peril.
-
SMB customers have a growing appetite for cloud-based security services. It isn't likely to be sated anytime soon. Thanks to a perfect storm of economic and technology trends, SMB consumption of cloud security services is expected to increase sharply over the next five years.
-
A pair of analysts surveyed how enterprises are using an agile methodology. The facts are interesting; their analysis is downright foolish.
-
Cloud-based application supports features of Office 2013.
-
What makes Akka so valuable for building today’s distributed applications?