Print Issue: April 01, 2014
Many CIOs are still unsure what role governance should play in their data archiving strategy.
James Hill senior security architect, Consolidated Data Services (CDS), discusses his role at his organization.
Recent breaches prompt a new emphasis on education and corporate culture, says Allegis Capital’s Bob Ackerman.
Choosing the right allies to ensure security requirements is a challenge for businesses both large and small, reports James Hale.
Will recent high-profile cyber attacks spur stronger security and improved risk management? The consensus from our data breach survey indicates: Yes, reports Teri Robinson.
With the addition of 15,000 mobile devices accessing its network, a medical center found assurance – and met compliance mandates, reports Greg Masters.
Some advice from pros for keeping your infrastructure out of the snares of a botnet. Alan Earls reports.
This month’s vulnerability is currently being exploited by a worm known as “TheMoon.”
Despite the bullishness around information security planning and budgeting seen in the results of our survey, we’re still seeing breaches like those experienced by Target
X1 is an agentless SAP auditing tool that is able to map out entire SAP landscapes and display any insecure configurations on the individual elements of the landscape.
Next post in First Look