Internal Threat

Internal threats come from employees and others with legitimate access. These people may or may not be going beyond their permitted access. For instance, a database administrator who has access rights can easily pilfer the data stored in those databases. In some cases, the thieves can mask their identities. Internal threats can come from lone wolves or those working in tandem with an outside entity. In general, losses incurred due to inside threats are more extreme than people breaking in from the outside.


Articles

Windows 8: Something for Everyone

It's the most important release from Microsoft in years, so perhaps not surprisingly, Windows 8 has a little something for everyone, from mobile and desktop users to server and storage pros. More >

Infrastructure in the Age of Big Data

I have a great idea for the next Hollywood blockbuster or 30-second Web ad, whichever generates more revenue.   I picture the trailer with your standard gravelly voiced narrator and hauntingly More >

Optimizing Local Infrastructure for the Cloud Is Easier Said Than Done

Virtualization and the cloud are poised to remake the worldwide data infrastructure as we know it.   The trouble is, there's no way of knowing exactly how all of the changes taking place are More >

More Articles >

Interviews

The Where, Why and How of Hybrid Storage

The key goal is to maximize flash’s utility without wearing it down.

More >

Virtual Desktops, Quick as a Flash

For VDI, the challenge is to find faster storage that preferably sidesteps much of the networking topology of a typical SAN. But as vendors like GlassHouse and Atlantis have shown, server-side Flash is very effective at speeding things up.

More >

Heady Days for Storage Optimization

Researchers at TheInfoPro recently canvassed a number of storage executives and found out that while overall storage spending is on the wane, interest in storage optimization is climbing. Technologies like automated tiering and deduplication are hot right now because even as budgets are tight, data loads continue to grow. Lead researcher Marco Coulter shares some of his insights.

More >

More Interviews >

Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making

SOA

SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data

Editor's Choice

Fifty Start-Ups Disrupting Their Industries

Security Staffing

Dell recently announced the new Founders 50 Fall 2014 cohort, which for the first time includes a global contingent representing five countries – the U.S., UK, Canada, France and the Netherlands.

 More >

FireLayers Unfurls Cloud Application Security Gateway

You Should Never Ignore IT Security Warnings

Basho Revamps Riak NoSQL Database

Dropbox Evolving into Cloud Application Platform

 

Articles  |  Interviews  |  Guest Opinions  | Slideshows

Related IT Downloads

IT Manager Job Description Job Description: IT Asset Manager

The IT Asset Manager is responsible for the daily and long-term strategic management of software and technology-related ha...

BCDRTN1 Business Continuity: Considerations, Risks, Tips and More

This guide pulls together several resources to help you identify the essential components involved in developing a strong ...

Job Description: Storage Administrator Job Description: Storage Administrator

Use this sample job description to aid your search for qualified candidates.

...

Planning for Data Center Physical Layout and Support Center Space Planning for Data Center Physical Layout and Support Center Space

Get a solid overview of issues involved in the physical design of your new data center with this research note.

...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.