----------------------------------------------------------------
This issue sponsored by CA, Inc:
---------------------------------------------------------------- Datacenter Automation, Virtualization and Cloud, OH MY!
Better support your business goals with Datacenter Automation.
The 4 Steps You Can Take Today
and 4 pitfalls you want to avoid.
Join this expert webcast featuring Forrester Research Inc. Register for webcast today!
ANALYTIC REPORTS & WHITEPAPERS
|
FEATURED REPORTS
Data-Centric Security
In this exclusive report, we explore the link between adoption of DLP and data-centric security and reveal what other technology is just as important, detail best practices to become more focused on data, and discuss when IT can help most by keeping its hands off. Download Now (Registration Required)
|
|
Integrity Check: 5 Steps to Data-Centric CyberSecurity
It's becoming more challenging to protect sensitive data and systems, and agencies that outsource major applications to the private sector are further abstracting system boundary and perimeter concepts. The answer is a shift in thinking away from yesterday's security approaches and toward data-centric protection via technologies like encryption, data loss prevention, and strong access controls. Download Now (Registration Required)
|
|
|
 |
 |
 |
|
FEATURED BLOG

Management Tools Will Be Cloud Glue
Posted By Vanessa Alvarez
The year has started out with significant M&A activity from vendors looking to deliver the necessary components for cloud computing. They all come to market with their own technologies and solutions, but there's one offering that's a must-have.
ALSO SEE
Latest iPad SDK Hints At New Touch Gestures
Posted by Eric Zeman
Late Tuesday, Apple made a new version of the software developers kit available for iPhone OS 3.2 for the iPad. As per usual, developers have made some interesting discoveries buried in the code, including some support for new finger gestures.
Google Gains While Palm Loses Smartphone Share
Posted By Eric Zeman
ComScore issued its latest report on smartphone usage in the United States for the three months ending January 2010. Google moved up significantly, while Palm dropped a few (more) percentage points. RIM, however, remains champion.
As Celebrities And Millions Joined Twitter Criminals Followed
Posted By George Hulme
Anyone who has been using social networks for the past couple of years has anecdotally witnessed an increase in malicious activity and phishing attacks. Today, a security firm released its analysis of 19 million Twitter accounts and has quantified just how rapidly malicious activity on Twitter has grown. Hint: it's been significant recently.
5 Reasons To Raise CIO's Pay
Posted By Bob Evans
The 30-year-old CIO of a Chicago-area public school district has a salary of $96,000 and until recently earned an additional $24,000 by serving as school-board treasurer. When the district's teachers accepted pay cuts due to budget limitations, they carped about the $24,000 stipend so the CIO gave it up, but requested the board consider increasing his salary. Here are 5 reasons why he deserves a big raise.
Spoofing Server-to-Server Communication: How You Can Prevent It
Learn how to prevent the new attack -- SSLStrip -- that exploits weaknesses of generic SSL to compromise server-server communication. You will learn valuable lessons from our presenter, Security Analyst, Larry Seltzer, about how you can prevent high-profile compromises of enterprise networks and breaches of data security.
It happens March 11, 2010 at 10:00 AM PT / 1:00 PM ET More Information & Registration
|
 |
---------------------------------------------
This issue sponsored by Quantum:
---------------------------------------------
Latest Resources from the Data Deduplication
and Replication Center:
- Reduce storage and network bandwidth by 90%.
- Quantum Cuts Backup Times at U.S. Army Command
- D2D2T Backup Architectures and the Impact of
Data Deduplication
- Achieved 95% reduction in Backup Volume. Find out who did!
|
|