Security71-290x195.jpg

Cybersecurity’s Human Side

One thing is clear so far during RSA. We need to think of cybersecurity in human terms, not just in data or technology.

More >
cloud32-290x195.jpg

Velostrata Helps Pit AWS Against Microsoft Azure

IT wants to be able to extract better pricing options from cloud service providers by being able to deploy existing application workloads based on VMware in either AWS or Azure.

More >
DataM2-290x195.jpg

IBM to Apply Machine Learning Algorithms to Local Data

IBM is pledging to give customers the ability to apply machine learning algorithms to data without requiring them to move data from their local data center into the cloud.

More >
email4-290x195.jpg

Distrust: Is It Time to Rethink Email? Or Throw It Out Altogether?

Anti-phishing needs to be built into email because too many people are being compromised. You need to be able to trust your communications.

More >
Security28-290x195.jpg

Security Professionals Urge Small Businesses to Improve Security Ef...

Small businesses need to step up their security process before disaster hits.

More >
DataM22-290x195.jpg

Syncsort Aims to Drain the Big Data Swamp

It’s not enough to simply dump data into a central repository. An IT organization needs to be able to build a pipeline for managing the flow of data into and out of the lake.

More >
IT Downloads

Compliance2 Building a GRC Program: Assessing Stakeholder Needs and Readiness

This table outlines the top needs of each stakeholder group that can help guide your conversations on priorities and needs for the GRC program.

Learn more >

Security95 Guide to Cyber Threat Information Sharing

This publication provides guidelines for establishing and participating in cyber threat information sharing relationships.

Learn more >

DataCtr5 Colocation Checklist

This checklist will help make sure you ask the important questions that will affect your colocation services and your eventual purchase decisions.

Learn more >

email9 Trustworthy Email

This document provides recommendations and guidelines for enhancing trust in email, including transmission and content security recommendations.

Learn more >

IT_Man77 Job Description: Technology Project Manager

Whether you're looking to hire one or looking for a position yourself, use this detailed job description to find out what the role of a Technology Project Manager entails.

Learn more >

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.