Discussions

  • The key to assigning risk values in an IT security risk assessment

    Security expert Michael Cobb offers pointers on how to assign risk values during a security risk assessment.

    searchsecurity21,410 pointsBadges:
  • Application-refactoring tools evolve, go social with PowWow

    Many app-refactoring tools have catches: They either don't work on Web apps or they need source code access. But with a new product from startup PowWow, you can deliver Windows and Web applications to devices without access to the source code.

    Gabe Knuth1,195 pointsBadges:
  • What will the future hybrid IT business model look like?

    During the 17th annual Cisco Partner Summit 2013, company executives put the spotlight on three key topics for partners: Opportunities in the midmarket The importance in the cloud The imperative to begin transitioning to a "hybrid IT" business model today In reference to point #3, what do you think...

    Michael Tidmarsh34,110 pointsBadges:
  • Real-world ways mobile apps boost employee productivity

    More and more IT departments are deploying, managing and even creating mobile applications. Using the right strategy, mobile apps can be a boon to employee productivity.

    ITKE352,565 pointsBadges:
  • How should CIOs prepare for handling IoT data?

    In this Ask the Expert, IDC analyst Vernon Turner advises CIOs on the near-term impact of the IoT on data centers and the upgrades they'll need to handle the flood of IoT data.

    ITKE352,565 pointsBadges:
  • Spear phishing attack led to ICANN compromise

    Attackers used spear phishing emails to swipe credentials from several ICANN staff members and accessed the non-profit organization's systems.

    Brandan1,115 pointsBadges:
  • The Basics of Information Security

    In this excerpt of The Basics of Information Security, author Jason Andress outlines methods for improving operating systems security.

    ITKE352,565 pointsBadges:
  • Businesses double down on big data value, analytics ROI

    Two new resources released over the past month reinforce the notion that companies are becoming more focused on getting real business value from their analytics initiatives.

    Ed Burns895 pointsBadges:
  • Agile business approach creates shift towards cloud BPM

    Organizations of all sizes have benefited from cloud BPM, but those perks are changing as a flexible approach to operations takes hold.

    Maxine Giza1,480 pointsBadges:
  • What IT infrastructure architecture is currently deployed in your data center?

    PKorzen460 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following