Beyond BlackBerry: 3 steps to prepare for its demise
It's easy to switch to iOS or even Android, no matter what type of company you are
Bob Violino | 02 Jul | Read more
It's easy to switch to iOS or even Android, no matter what type of company you are
Bob Violino | 02 Jul | Read more
As vehicles offer an ever-growing number of digital features, they could present several security threats--unless automakers manage these technologies effectively.
Bob Violino | 11 May | Read more
Chris Camacho, information security officer at The World Bank Group in Washington D.C., explains how the Red Sky alliance helps member organizations safely share information.
Bob Violino | 08 May | Read more
In IT, failure is not an option. Not surprisingly, organizations have made it a high priority to develop and implement reliable business continuity plans to ensure that IT services are always available to internal users and outside customers.
Bob Violino | 03 Apr | Read more
Does governance, risk and compliance (GRC) really pay off? It's a valid question for any organization that's looking to formulate a corporate strategy and implement software for managing GRC.
Bob Violino | 29 Mar | Read more
A key part of any information security strategy is disposing of data once it's no longer needed. Failure to do so can lead to serious breaches of data-protection and privacy policies, compliance problems and added costs.
Bob Violino | 07 Feb | Read more
The global economic downturn is apparently having no major effect on the market for <a href="http://www.csoonline.com/article/330713/a-buyers-guide-to-ip-surveillance-cameras">IP video surveillance cameras</a> and other equipment, as sales remain strong worldwide. Meanwhile, the technology continues to evolve, and the emergence of high-definition (HD) video and megapixel resolution are among the more prominent trends in video surveillance.
Bob Violino | 13 Sep | Read more
How can you be sure your organization doesn't have insidious viruses or other <a href="http://www.infoworld.com/t/malware">malware</a> lurking within systems and applications, waiting to inflict damage? You can't.
Bob Violino | 05 Jul | Read more
Members of the Open Group's Security for the Cloud and SOA Project have launched a new <a href="http://www.csoonline.com/article/505871/the-curse-of-cloud-security">security architecture for the cloud</a>, to help security organizations better understand the unique security aspects of cloud computing.
Bob Violino | 20 Jun | Read more
ISACA, a global association of 95,000 IT assurance, security and governance professionals, has launched a new customisable audit program to help enterprises address the complex and emerging area of social media governance.
Bob Violino | 11 Mar | Read more
Expert advice on evaluating and selecting a unified threat management (UTM) appliance that fits your needs.
Bob Violino | 09 Apr | Read more
Experts provide some critical tips for evaluating and using network scanners.
Bob Violino | 12 Mar | Read more
Network behavior analysis tools can help tune operations as well as improve security. Here are five tips for getting the job done.
Bob Violino | 13 Nov | Read more
Many companies are using standards and frameworks to deal with certain aspects of information security. These models can help protect systems and data, but each plays a very different role in an overall security plan.
Bob Violino | 18 Apr | Read more
Today's Web-connected applications need more than just firewalls. Application-security gateways can't grow up fast enough.
Bob Violino | 14 Oct | Read more