Cloud computing and the consumerization of enterprise IT has taken the app-store procurement model beyond its consumer focused origins
Stanford engineers and Facebook are both hoping to influence others into thinking about their data center power use, even in the cloud.
Every administrator has a question about their data center or IT roadmap that they're afraid to ask. On April 1, we answer three such questions.
Indian companies are beginning to adopt managed security services as a lack of internal resources and rapidly changing business models force a change of strategy
OpenDNS CTO Dan Hubbard says big data techniques like machine learning and data mining can be used to spot and mitigate unknown Internet threats.
In this excerpt from Linux Malware Incident Response, authors Cameron Malin, Eoghan Casey and James Aquilina discuss volatile data collection methodology, steps and preservation.
Tata Consultancy Services and Twitter create app to help people observe, analyse and get involved in the Indian general election
More affordable and easier-to-use software is enabling companies in various industries to embrace the power of business intelligence and analytics.
Health system UPMC and financial services firm CIBC are taking big data projects from pilot mode to production in stages, buying tools as they go.
CIOs harness the power of cloud computing and fine-tune their individual cloud model to the business' benefit.
Two small businesses with big website requirements explain how they ultimately got what they wanted in a website developer.
SearchCIO has rounded up free templates from around the Web providing guidance on IT vendor selection, social sharing and mobile device policies.
Server virtualization, managed data centers and hosted software can affect your company's compliance controls. Here's how to overcome the obstacles.
An educational testing service firm gives high marks to an off-the-shelf security management tool to protect student data.
The underlying legal issues for SaaS contracts can be ticking time bombs if you don't pay attention to the details.
Attorney Jeffrey Ritter discusses mobile management processes to help companies protect both their data assets and employees' personal information.
In our latest #GRCchat, tweet jammers discussed cloud computing issues and challenges and explained how governance, risk and compliance factor in.
In this RSA 2014 video interview, learn why companies that ignore the scope of their data assets dramatically increase information security risk.