Print Issue: October 01, 2013
By mining log data and managing it proactively – instead of ignoring it until something goes wrong – organizations can mitigate risk, ensure service availability and promote operational efficiency.
Targeted malware attacks are growing in number, sophistication and severity in the potential damage they can inflict on victims.
This month we asked Gregory Gong, managing partner, Wall Street IT Management, about his job.
Cloud providers must be evaluated before moving operations, says the DTCC’s Mark Clancy.
A school district in New Hampshire needed to enable its students and faculty to use mobile devices wirelessly, while retaining security and performance control over its network.
Obstacles still remain before companies can safeguard assets in the cloud, but software advances are helping, reports David Cotriss.
Every business faces the possibility of external attacks, but another potential threat is on the premises, reports Dan Raywood.
With the barrage of attacks only growing, today’s enterprise must face reality with a variety of defenses, reports James Hale.
Criminals leverage medical devices for targeted attacks, says Dale Nordenberg of the Medical Device Innovation, Safety and Security Consortium. Karen Epper Hoffman reports.
Next post in Features