While the penny-a-gig Amazon Glacier service will make an impact on cloud archiving, it may not dominate the market.
Dennis Martin discusses the advantages of using the SR-IOV and MR-IOV specifications for I/O virtualization in this expert video.
News of a Nirvanix partnership filled in some details about Dell's cloud storage strategy, but the company still treats its cloud plans as a secret.
Will the Internet of Things bring Cybergeddon upon us? Let's hope not, but the IoT age has arrived and CIOs should be thinking about how to protect it, say security experts from IBM and Intel.
What can businesses' willy-nilly adoption of SaaS apps do for CIOs? Remove the invisibility cloak, and shadow apps become a golden opportunity to enable business goals, beef up security and save money.
What's your company doing about the Internet of Things? The Amazon CTO's list of IoT efforts in science, consumer products and sports should convince CIOs to get cracking: The Data Mill reports.
RSA researchers say the costly Pandemiya banking malware was written entirely from scratch, a dangerous oddity in the world of malware.
PayPal's Michael Barrett says many firms fear misuse of shared cybersecurity data. He also discusses the evolution of PCI DSS and mobile payment security.
A cybergang in Eastern Europe revealed plans to attack U.S. banks with a Gozi-like Trojan, according to RSA.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
SearchMidmarketSecurity.com’s tutorials offer IT professionals in-depth lessons and technical advice on the hottest topics in the midmarket IT security industry. Through our tutorials we seek to provide site members with the foundational knowledge needed to deal with the increasingly challenging job of keeping their organizations secure.
Learn about bandwidth management vendor Websense's partner program in this standardized checklist.
Learn more about configuration control software vendor Tripwire, Inc.'s partner program in this standardized checklist.
This section of the chapter excerpt focuses on supporting multiple administrative levels of router configuration.