Active Directory, AS/400, Business Intelligence, Career Development, CIO, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
In the wake of Heartbleed, many enterprises are revisiting open source software security. Expert Michael Cobb offers a reality check.
Channel partners, particularly those with IT security experience, may find new opportunities in the emerging field of breach detection technology.
A new report details how attackers can fly under the radar by using stolen credentials in order to avoid breach detection and forgoing the use of malware in malicious activity.
As the focus of security moves to detection and response, a new product aims to find stolen corporate data within seconds to minutes of a data breach occurring by crawling the dark Web, but one expert questions the need for such a product.
Cyber liability insurance claims and lawsuits are expected to rise considerably in the next couple years and experts believe they will lead to improved security for enterprises and developers.