Security Channel
News and Analysis
Government Shutdown: What Are IT Systems Risks?
If the looming government shutdown comes to pass, Federal IT faces security, budget, and workflow risks.
More News and Analysis
- Cisco NCS Tackles Internet of Things
- NSA Chief: Don't Dump Essential Security Tools
- Apple Fingerprint Hack: A Great Reminder
- Riverbed Adds Whitewater Capacity, Speed
More News and Analysis in Security Channel »
Architectures
Cloud-Based Security Helps Aspen Fend Off Malware
Cloud security service cuts down on malware infections and provides relief for small network team in Colorado.
More Architectures
- United Oil Cuts the Wires
- MDM Helps Bank Manage Apple iPhones, iPads
- Big Switch's OpenFlow Controller Guns for SDN Leadership
- Outage Blackballs BlackBerry, Guides Arrow to BYOD Strategy
More Architectures in Security Channel »
Reviews & Workshops
Digital Hoarding: Do We Have a Problem?
Approximately 2.8 zettabytes of data were created and stored in 2012, and that number is expected to increase 50-fold by the end of the decade. When does data storage turn into data hoarding, and what are the consequences?
More Reviews & Workshops
Blogs
Information Security Strategy: Stop Punishing End Users
September 30, 2013 11:19 AM
Posted by Joseph Granneman
Enterprise security programs have longed focused on restricting end-user activity, but this strategy hasn't worked. It's time to change course.
See all blogs by Joseph Granneman
InteropNet: Insights from a 19-Year Vet
September 24, 2013 04:39 PM
Posted by
A nineteen-year volunteer of InteropNet says it's the people as much as the technology that keep him coming back.
WAN Encryption Tops the Agenda After NSA Revelations
September 24, 2013 11:00 AM
Posted by Greg Ferro
Whatever trust customers had in the security of WAN connections from service providers is gone. Encrypt now, and consider less-expensive Internet connections instead.
See all blogs by Greg Ferro
Data Protection In The Cloud Era
September 18, 2013 02:06 PM
Posted by Tom Trainer
Organizations need to review security policies and procedures before implementing newer technologies such as cloud computing and virtualization.
See all blogs by Tom Trainer
9 Immutable Laws of Network Design
September 17, 2013 06:54 PM
Posted by Jennifer Minella
Follow these simple rules to ensure your network is stable, secure and built to last as you overlay new services and applications.
See all blogs by Jennifer Minella
12 Must-Attend Interop Events
September 13, 2013 03:41 PM
Posted by Andrew Conry Murray
Interop New York is just around the corner. The show is packed with informative sessions and workshops. Here are a dozen to put on your schedule.
See all blogs by Andrew Conry Murray










