App security, Messaging security, Web security, OS security, Managing vulnerabilities
Email threats, Cybercrime, Data security, Malware
Network design, Access management, Intrusion management, Endpoint security, Secure remote access
Risk management, Security jobs, Information security market, Newsmakers
While the penny-a-gig Amazon Glacier service will make an impact on cloud archiving, it may not dominate the market.
Dennis Martin discusses the advantages of using the SR-IOV and MR-IOV specifications for I/O virtualization in this expert video.
News of a Nirvanix partnership filled in some details about Dell's cloud storage strategy, but the company still treats its cloud plans as a secret.
Building an enterprise data strategy, collaborative filtering, algorithms and the CFO: The Data Mill reports from the 2013 MIT Sloan CFO Summit.
Visiting Budapest, CIO Alexander Pasik realized innovative thinkers are mostly born, not made. So he developed a process to capitalize on them.
Disruptive innovation theorist Clay Christensen warns CIOs to be skeptical of time-honored business tenets.
PayPal's Michael Barrett says many firms fear misuse of shared cybersecurity data. He also discusses the evolution of PCI DSS and mobile payment security.
A cybergang in Eastern Europe revealed plans to attack U.S. banks with a Gozi-like Trojan, according to RSA.
The latest variant of the banking Trojan is causing numerous problems, Symantec said.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
Assessing your organization's security threats and risks takes just five steps, says Robbie Higgins. Check out his quick guide to the SMB security risk assessment process.
Learn about bandwidth management vendor Websense's partner program in this standardized checklist.
Learn more about configuration control software vendor Tripwire, Inc.'s partner program in this standardized checklist.
This section of the chapter excerpt focuses on supporting multiple administrative levels of router configuration.