• Most UK workers believe data theft is inevitable

    Almost two-thirds of the 2,000 full-time UK workers polled said they feel more vulnerable to data hacks than they did a year ago, a survey shows

    WAshford4,110 pointsBadges:
  • EU Safe Harbour ruling requires a rethink of data processes

    The European Court of Justice's decision to invalidate the Safe Harbour agreement has far-reaching implications for businesses

    WAshford4,110 pointsBadges:
  • SOX Cross Mapping with ISO 27001

    Jeffery, great article on SOX. Would you direct me to documents that show cross mapping between SOX and ISO 27001. Thank you.

    recomply5 pointsBadges:
  • How has the HP split changed your business strategy?

    Lynn Haber2,670 pointsBadges:
  • HP partner program splits into HP Partner First, HPE Partner Ready

    Following Hewlett-Packard's company split, the HP partner program will break into two distinct programs: Partner First and Partner Ready.

    Lynn Haber2,670 pointsBadges:
  • New YiSpecter iOS malware affects non-jailbroken devices

    Malicious actors have found new ways to attack non-jailbroken iOS devices, but experts say the YiSpecter iOS malware may not be as dangerous as it sounds.

    mheller1,255 pointsBadges:
  • IT automation that works

    Automation of computing infrastructure provisioning and changes ensures that these resources will always be allocated according to business needs. This concept can be applied to servers, virtual machines, software, network bandwidth, storage capacity, databases or any computing-related resource.

    SearchCIO5,070 pointsBadges:
  • VMware vRealize Suite

    VMware vRealize Suite is a software product suite designed to enable IT professionals to create and manage hybrid clouds.

    Margaret Rouse9,415 pointsBadges:
  • Build an enterprise security strategy for Exchange

    With recent news like the NSA's PRISM program grabbing headlines, enterprises are rethinking overall security, including for Exchange.

    MVanHorenbeeck325 pointsBadges:
  • Is full email encryption the solution to Exchange security?

    Many security officers would suggest that encrypting every email that goes through Exchange is the best way to protect your organization. A better approach is to focus on security basics first and then and think about encrypting email.

    Kevin Beaver19,520 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.