Enterprise information security management
- December 05, 2007
It's not so much the slacking off that concerns CIOs. Record online shopping and a shaky economy could black hole your company.
- November 21, 2007
Talk turkey all you want tomorrow. Today, it's time to give thanks that you work in IT.
- November 15, 2007
A rose by any other name would smell as sweet, right? Not in the world of IT, where new acronyms and titles are being used to grease the wheels of innovation.
- November 13, 2007
How many years have the pundits harangued IT to get in touch with the business? Lesson learned, according to respondents in our 2007 salary survey.
- October 31, 2007
A data loss prevention vendor turns the table on protecting sensitive data with a feature that automatically finds sensitive data and determines who should be allowed to access it.
- October 17, 2007
Offshore outsourcing can save money. Are the savings worth the security risks? Columnist Philip Alexander addresses security and data concerns CIOs should be aware of when sending work offshore.
- September 19, 2007
A 15-month study by health experts and vendors tests electronic health record systems -- and the grade is not good.
- September 19, 2007
Human error is still the main reason for security breaches, but a little learning, it turns out, isn't a dangerous thing after all.
- August 21, 2007
It's a marriage made in Mensa: A law firm and a seasoned vendor figure out how to marry content management to litigation services to come up with a tool that does everything but argue cases.
- July 25, 2007
According to new research, most businesses will use IM to communicate with coworkers. Upshot: You can't ignore it any longer.
- July 10, 2007
New research suggests most IT organizations think they're doing a good job protecting intellectual property. But their answers to questions about how they protect this information say otherwise.
- July 05, 2007
Many organizations rely heavily on mobile workers, such as sales and technical support staff members who bring in revenue and keep customers satisfied. According to industry experts, the first step in mobile computing success is to create and ...
- June 07, 2007
Staffing is a critical part of any risk management plan. And although much of the risk any company manages surrounds its IT function, the people who keep the databases humming shouldn't be the same ones who assess those threats, experts say.
- June 05, 2007
New spear phishing attacks are attempting to con senior corporate executives with threatening fake messages from the Better Business Bureau and the IRS.
- May 31, 2007
Google's purchase of security software company GreenBorder is smart in more ways than one.