Active Directory, AS/400, Business Intelligence, Career Development, CIO, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Marketing Technology, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
Cloud computing has fundamentally changed the way enterprises deploy and use IT resources. So what does it mean to build a cloud network?
Editorial Director Robert Richardson says it's easy to question the RASP security model, as it joins the growing list of application security testing acronyms, but the self-monitoring approach may hold merit.
There's no shortage of new security technology, but enterprise integration is still a major hang-up, says AT&T's chief of security.
Looking for security vulnerabilities? Tread lightly. The benefits of vulnerability rewards programs are great, but so are the risks.
What is 'good enough' security and when you need something better.
Bug bounty programs are a cool idea and often work, so why haven't they taken off for non-tech companies?
Analytics-driven security disrupts -- and sometimes supplants -- SIEM tools.
Two-factor authentication is a security process in which the user provides two means of identification, one of which is typically a physical token, such as a card, and the other of which is typically something memorized, such as a security code.
An identity management access (IAM) system is a framework for business processes that facilitates the management of electronic identities.