* Indicates field is required
Paul Kirvan discusses the importance of creating an after-action report following a disaster recovery exercise and offers tips on creating the report.
Learn why data protection practices common in traditional file storage environments aren't the best option for objects, and how metadata can help.
Learn how different scale-out architectures can be good options for providing high availability and easy growth.
Knowing how your company makes business decisions could be the difference between an innovation project's success or failure. The Data Mill reports.
Without enterprise security, mobile payment platform company LevelUp could not stay in business. Here are four components of its security strategy.
The pushback against Uber offers a lesson in risk-taking for CIOs. Also in Searchlight: Black Friday loses sales steam, but Cyber Monday is stronger than ever, especially for smartphone users.
RSA researchers say the costly Pandemiya banking malware was written entirely from scratch, a dangerous oddity in the world of malware.
PayPal's Michael Barrett says many firms fear misuse of shared cybersecurity data. He also discusses the evolution of PCI DSS and mobile payment security.
A cybergang in Eastern Europe revealed plans to attack U.S. banks with a Gozi-like Trojan, according to RSA.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
SearchMidmarketSecurity.com’s tutorials offer IT professionals in-depth lessons and technical advice on the hottest topics in the midmarket IT security industry. Through our tutorials we seek to provide site members with the foundational knowledge needed to deal with the increasingly challenging job of keeping their organizations secure.
Learn about bandwidth management vendor Websense's partner program in this standardized checklist.
Learn more about configuration control software vendor Tripwire, Inc.'s partner program in this standardized checklist.
This section of the chapter excerpt focuses on supporting multiple administrative levels of router configuration.