Enterprise information security management
- October 14, 2011
As any CIO knows, you must be prepared for just about anything. Hurricanes in Vermont? Sure. Earthquakes in Virginia? You bet. But many CIOs forget about one very obvious hole in their disaster ...
- October 04, 2011
I recently asked one of my sons for passwords to his online accounts, for gaming, email, etc. Not because I'm nosy but because I'm trying to be a responsible parent and home IT administrator, and ...
- August 29, 2011
It's been a busy week in tech, between the Earth shaking, hurricane preparations and the departure of one of tech's most recognizable faces, Steve Jobs. Here's our favorite pieces of tech news from ...
- August 11, 2011
Can automated software quality metrics for gauging structural integrity cut development costs and reduce business risk? One consortium says they can.
- August 08, 2011
Every week, we scour the wealth of information on the blog circuit and give you the finer talking points to help you score erudite points around the Twitter water cooler. Here's the latest sampling ...
- August 04, 2011
Back in the '90s and early 2000s, I had two acquaintances who called themselves "hackers." Being a burgeoning geek girl myself, I kind of figured that they were affecting the moniker to be cool. ...
- August 02, 2011
In my spare time I run a little PC service repair business, mostly for friends and family. It's mostly cleaning computer viruses, installing wireless networks and sometimes building gaming systems. ...
- April 22, 2011
Mondays have a reputation for being the least favorite day of the week for many people. Normally I disagree with that feeling, but this Monday at 9 a.m., my laptop started acting a little hinky. I ...
- April 12, 2011
My wife and I started getting the emails April 4. Best Buy. Our bank. Other e-commerce sites we had shopped. The impact of the Epsilon security breach was far and wide. My first thought was that at ...
- March 25, 2011
Suzanne Hall is "really excited" about the pilot the American National Red Cross will launch next month, thanks to the largesse of Courion Corp., an identity management provider that's given away ...
- March 24, 2011
Why build when you can buy? Market6 chose a SaaS platform to transform its single-tenant software into a multi-tenant cloud offering packed with sales support.
- March 10, 2011
Federated identity management groups and vendors toss up standards and solutions, as enterprises attempt to wrest control of user access to cloud-based applications.
- December 23, 2010
Those of you who find the Wikileaks story fascinating, as I do, might enjoy zooming through Red's Query, a fictional piece of work by technology media executive Eric Lundquist. The last quarter of ...
- December 17, 2010
The WikiLeaks debacle has put a spotlight on the need for better corporate security policies and new technology approaches. But even these safeguards are no guarantee in an age where data is so ...
- October 12, 2010
A proliferation of mobile devices in the enterprise forces CIOs to reassess policies, budgets and backups for mobile data security.