Leadership / Planning, IT budgeting, IT governance, Vendor selection / Outsourcing
Linux-based server management, Unix-based server management, Windows-based server management, Blade server management, Virtual server deployment and management
SAN technology, NAS technology, Data backup and disaster recovery, Data storage planning and management, Data storage virtualization
Planning and layout, Infrastructure, Management, Green data center, Cloud computing
Network Security / Data Protection, Platform / App Security, Threat management, Security management
ERP software, CRM software, BI software, App dev, App integration, SOA & Web services
Cloud partners use a plethora of tools to help customers migrate to the cloud, but they find their automation efforts can bump into limitations.
Pharmaceutical company AstraZeneca has rolled out ServiceNow self service IT to 51,500 staff globally in four months.
Indian organizations' adoption of cloud computing is rising each year but the market's maturity is developing much more slowly
US retailer Home Depot is investigating a possible data breach of customer payment card information that is potentially greater than the Target breach.
In an advisory, the U.S. government estimated that the Backoff point-of-sale malware campaign has struck over 1,000 businesses to date.
At Black Hat, David Litchfield skewered Oracle and its approach to security while detailing several flaws in a new Oracle database security feature.
Using social media to gather data on customers has been rife with opportunities -- and risks -- for customer data privacy.
The concept of data privacy in the age of big data may seem somewhat antithetical to most commercial data-gathering operations, but organizations that don't respect their users' privacy may soon have big problems on their hands.
Good CSRs offering good customer service used to be enough for a contact center. But, today, facilities need to dump legacy technology to stay ahead.
In this Q&A, a data scientist explains why he combines objective data with human critiques to assess risk in Gilt's pre-emptive shipping program.
In this Q&A, Igor Elbert describes Gilt's pre-emptive shipping program, which leans on his expertise in machine learning and predictive modeling.
Is your organization better suited to build, buy or blend its big data architecture? Discuss with SearchCIO during #CIOChat Wednesday, Sept. 24, at 3 p.m. EDT.
Server virtualization, managed data centers and hosted software can affect your company's compliance controls. Here's how to overcome the obstacles.
An educational testing service firm gives high marks to an off-the-shelf security management tool to protect student data.
The underlying legal issues for SaaS contracts can be ticking time bombs if you don't pay attention to the details.
A new study has that found data protection laws and state secrecy rules have created legal obstacles for businesses conducting operations in Asia.
Join SearchCompliance Sept. 18 to discuss the state of enterprise mobile security and how to adapt BYOD policies to best protect company data.
Participants in the latest #GRCchat discuss how to overcome the legal discovery challenges presented by vendor management and social media data.