eweek.com

Ten Vulnerabilities that Impact Enterprise Cloud Apps

With increased popularity comes more attention from malicious hackers trying to access PII and other sensitive data. It's more critical than ever before to understand how -- and where -- you're storing your data, and the variety of vulnerabilities that can exist in the apps in your network.

More >
eweek.com

HyTrust Partners with Intel on Virtual Machine Controls

HyTrust, in partnership with Intel, today announced Boundary Controls, a set of tools for defining which virtual machines can run in a specified area within a data center environment.

More >
eweek.com

Lenovo and IBM x86: FUD and the Strategic Advantages of Buying from...

Given that Lenovo successfully acquired IBM PC business and changed it from market laggard to leader, the positive outcome of the x86 merger is near certain.

More >
eweek.com

How to Monetize Data in Five Steps

Information is money. A lot of information should mean a lot of money. Unfortunately, most organizations are still struggling with the idea of how to turn data into profit.

More >
eweek.com

Security and Privacy Issues Surround Wearables

A recent survey shines light on the topic of privacy and security with wearable computing devices.

More >
eweek.com

Five Small Companies that Kick Tech Butt

It's good to know that small companies fill unique gaps for business that the bigger players can’t or won’t fill.

More >

IT Downloads

Analytics08 Job Description: Data Scientist

The data scientist drives initiatives to improve website monetization and user experience, while delivering analytics to better understand user engagement.

Learn more >

Money3 PCI Compliance: The Definitive Guide

In this excerpt from chapter 20, the author briefly discusses the challenges and success factors that the organization must be aware of to maintain compliance and achieve optimum information security for the enterprise.

Learn more >

IT_Man20 Agile Strategy Management: Techniques for Continuous Alignment and Improvement

The excerpt from chapter 2 focuses on building the best possible team to perform the strategic initiative the organization has identified as a worthy opportunity.

Learn more >

Mobile7 Job Description: Director, Corporate Information Technology (IT)

The Director of Corporate IT is expected to establish and maintain company-wide security and compliance policies, and set the vision and strategy for enabling a highly efficient workforce.

Learn more >

IT_Man21 Trust and Betrayal in the Workplace: Building Effective Relationships in Your Organization

The excerpt from chapter 8 focuses on how to rebuild trust with the seven steps for healing, which are intended to serve as a framework to help readers work through the painful feelings of betrayal toward renewal.

Learn more >

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.