* Indicates field is required
Paul Kirvan discusses the importance of creating an after-action report following a disaster recovery exercise and offers tips on creating the report.
Learn why data protection practices common in traditional file storage environments aren't the best option for objects, and how metadata can help.
Learn how different scale-out architectures can be good options for providing high availability and easy growth.
A company's IT strategy can determine whether it sinks or floats in today's competitive marketplace. Download our free checklist to find out what components should be in your strategic IT plan.
The OPM breach called into question the safety of fingerprint biometrics. What can CIOs learn from it? Plus: Google unveils latest Nexus devices; Experian hack exposes 15 million T-Mobile customers.
IT projects of any kind can be calamitous -- and organizations mixing public and private cloud services with traditional IT have had a lot go wrong, said experts at the Hybrid Cloud Summit.
Drive-by financial malware Fobber is the evolution of the popular Tinba -- with better encryption, a newer format and a focus on the Netherlands.
Heimdal Security researchers have found new cases of the nesting-doll financial malware, while Fortinet researchers peel back the layers to reveal its surprising intricacies.
A new Symantec report shows a significant fall in banking malware infections in 2014, but the company warns that malware remains a threat to financial firms.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
SearchMidmarketSecurity.com’s tutorials offer IT professionals in-depth lessons and technical advice on the hottest topics in the midmarket IT security industry. Through our tutorials we seek to provide site members with the foundational knowledge needed to deal with the increasingly challenging job of keeping their organizations secure.
Learn about bandwidth management vendor Websense's partner program in this standardized checklist.
Learn more about configuration control software vendor Tripwire, Inc.'s partner program in this standardized checklist.
This section of the chapter excerpt focuses on supporting multiple administrative levels of router configuration.