eweek.com

Seven Key Components to Start Your Incident Response Plan

Regardless of the size of an enterprise or its industry, organizations must create and implement an incident response program to effectively and confidently respond to current and emerging cyber threats.

More >
eweek.com

Trend Micro Reduces Endpoint Security Complexity

The latest version of the Trend Micro Complete User Protection software reduces IT security complexity and confusion by centralizing the management of on-premise and cloud security offerings.

More >
eweek.com

Top 10 Mistakes Job Seekers Make

Mistakes happen, but for job seekers it can mean the difference between landing a new gig and collecting another unemployment check.

More >
eweek.com

How Dell OEM Could Fix the Affordable Care Act

Rather than attacking each other in Congress, maybe the U.S. political parties should attack what makes the service non-viable—its cost.

More >
eweek.com

Tensions Between IT and Business Leadership Force New Approach to D...

Global research shows 37 Percent of technology budgets now controlled outside of IT departments; 79 percent of C-level executives believe they can make better and faster decisions without the involvement of IT.

More >
eweek.com

Heartbleed Bug Proves More Frustrating for SMBs

Patching the company website may not get your SMB out of trouble with Heartbleed. Network devices are also affected by the vicious bug.

More >

IT Downloads

Career03 Job Description: Senior Information Technology Auditor

Responsibilities include participating in information technology risk assessments, IT audits, Sarbanes-Oxley compliance assessments, and IT consulting engagements. 

Learn more >

Security5TN A Methodology for Developing Authentication Assurance Level Taxonomy for Smart Card-based Identity Verification

This publication presents a methodology for assigning authentication strengths based on the strength of pair wise bindings between the five entities involved in smart card based authentications.

Learn more >

Global1 Virtual Meeting Checklist

Like any meeting, a virtual meeting should be well planned and engaging for all those who attend. Unfortunately, most who take part in frequent virtual meetings don’t often find that is the case.

Learn more >

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.