Active Directory, AS/400, Backup, Business Intelligence, Career Development, CIO, CRM, Data Management, Database, DataCenter, Desktop Management, Development, Hardware, IBM DB2, IBM iSeries, Linux, Lotus Notes, Management, Marketing, Marketing Technology, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
Third-party vendors are enabling bug bounty programs for organizations of all sizes, experts say, by handling triage and payment duties.
Many defects aren't found with code review. Gary McGraw and Jim DelGrosso think architectural risk analysis is a must to uncover software flaws.
Do you know the proper incident response steps to handle a breach? Expert Davy Winder covers how to manage incident response team responsibilities.
Security incidents are going to happen. Don't get caught flat footed.
Expert Nick Lewis discusses the Cyber Incident Response Assistance certification from the NSA's National Security Cyber Assistance Program and what the accreditation means for an enterprise.
Ever wondered what goes on in the mind of a hacker? Sten Kalenda reveals all
Before you evaluate specific Hadoop software or subscriptions, examine what features the vendor distributions provide and how they match your big data management needs.