Cloud computing and the consumerization of enterprise IT has taken the app-store procurement model beyond its consumer focused origins
Stanford engineers and Facebook are both hoping to influence others into thinking about their data center power use, even in the cloud.
Every administrator has a question about their data center or IT roadmap that they're afraid to ask. On April 1, we answer three such questions.
Indian companies are beginning to adopt managed security services as a lack of internal resources and rapidly changing business models force a change of strategy
OpenDNS CTO Dan Hubbard says big data techniques like machine learning and data mining can be used to spot and mitigate unknown Internet threats.
In this excerpt from Linux Malware Incident Response, authors Cameron Malin, Eoghan Casey and James Aquilina discuss volatile data collection methodology, steps and preservation.
Tata Consultancy Services and Twitter create app to help people observe, analyse and get involved in the Indian general election
More affordable and easier-to-use software is enabling companies in various industries to embrace the power of business intelligence and analytics.
Health system UPMC and financial services firm CIBC are taking big data projects from pilot mode to production in stages, buying tools as they go.
The demise of the data scientist; traditional data warehousing makes a comeback; and the self-quantified self: The Data Mill reports.
BI and analytics will experience rapid adoption in 2014 as BI vendors face a changing market.
Searchlight: OpenSSL's 'Heartbleed' spills personal identifiable information; how to be a better CIO; a new twist on packing tape; and more.
Server virtualization, managed data centers and hosted software can affect your company's compliance controls. Here's how to overcome the obstacles.
An educational testing service firm gives high marks to an off-the-shelf security management tool to protect student data.
The underlying legal issues for SaaS contracts can be ticking time bombs if you don't pay attention to the details.
In our latest #GRCchat, tweet jammers discussed cloud computing issues and challenges and explained how governance, risk and compliance factor in.
In this RSA 2014 video interview, learn why companies that ignore the scope of their data assets dramatically increase information security risk.
Join our #GRCchat Thursday, April 17, to discuss the roles of tracking and managing vital IT assets for an information lifecycle governance strategy.