Security4-290x195.jpg

Digital Transformation Has Companies Re-thinking Security Strategies

In the age of digital transformation, improving the “security playbook” is necessary in order to avoid the C-suite level executive’s two worst nightmares: corporate financial data theft and customer information theft.

More >
DataCtr1-290x195.jpg

Oracle Extends Reach and Scope of Oracle Cloud

In general, Oracle is playing catch-up in the cloud. The Oracle cloud portfolio spans infrastructure-as-a-service (IaaS), platform-as-a-service (PaaS), software-as-a-service (SaaS) and data-as-a-service (DaaS) offerings.

More >
Security51-290x195.jpg

Gmail Phishing Attack Highlights Need for Multi-Factor Authentication

We should expect more phishing attacks like this, or at least increasingly sophisticated and more difficult to detect.

More >
Risk 8-290x195.jpg

9 Predictions for Cybersecurity’s Role in Government and Politics...

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017.

More >
IT_Man17-290x195.jpg

IT Leaders Need to Be Business Leaders First, CIO Says

The key to making an impact as an IT leader is to come to the table as a business leader who happens to be running the technology team, rather than purely as a technologist waiting to receive requirements to fulfill.

More >
DataCtr5-290x195.jpg

Is Hyperscale Consolidation Really a Good Thing?

Even as the enterprise industry migrates to the cloud, it might be beneficial to examine some of the downsides to the hyperscale trend, particularly the consequences of consolidating resources onto a relatively finite number of physical data centers around the world.

More >
IT Downloads

Compliance2 Building a GRC Program: Assessing Stakeholder Needs and Readiness

This table outlines the top needs of each stakeholder group that can help guide your conversations on priorities and needs for the GRC program.

Learn more >

Security95 Guide to Cyber Threat Information Sharing

This publication provides guidelines for establishing and participating in cyber threat information sharing relationships.

Learn more >

DataCtr5 Colocation Checklist

This checklist will help make sure you ask the important questions that will affect your colocation services and your eventual purchase decisions.

Learn more >

email9 Trustworthy Email

This document provides recommendations and guidelines for enhancing trust in email, including transmission and content security recommendations.

Learn more >

IT_Man77 Job Description: Technology Project Manager

Whether you're looking to hire one or looking for a position yourself, use this detailed job description to find out what the role of a Technology Project Manager entails.

Learn more >

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.