( Apr 16, 2014 )
( Apr 07, 2014 )
( Apr 04, 2014 )
By forgoing traditional hardware and using a cloud-first approach, one company was able to take advantage of scripted automation -- and save money.
Cloud computing and the consumerization of enterprise IT has taken the app-store procurement model beyond its consumer focused origins
Stanford engineers and Facebook are both hoping to influence others into thinking about their data center power use, even in the cloud.
It is more than 10 years since context-aware security was proposed. We look at how the technology has evolved.
Indian companies are beginning to adopt managed security services as a lack of internal resources and rapidly changing business models force a change of strategy
OpenDNS CTO Dan Hubbard says big data techniques like machine learning and data mining can be used to spot and mitigate unknown Internet threats.
Tata Consultancy Services and Twitter create app to help people observe, analyse and get involved in the Indian general election
The demise of the data scientist; traditional data warehousing makes a comeback; and the self-quantified self: The Data Mill reports.
More affordable and easier-to-use software is enabling companies in various industries to embrace the power of business intelligence and analytics.
Experts from Cisco, Caesars, Schneider, and GE give their two cents on how BI and analytics trends will evolve in the next two years.
As corporations go high-tech, the bad guys go low-tech around cyberdefenses. Here's what CIOs miss and how to go on the cyberoffense.
In these days of a breach a minute, a strong information security program is a competitive differentiator. Here's how CIOs and CISOs prove it.
Server virtualization, managed data centers and hosted software can affect your company's compliance controls. Here's how to overcome the obstacles.
An educational testing service firm gives high marks to an off-the-shelf security management tool to protect student data.
The underlying legal issues for SaaS contracts can be ticking time bombs if you don't pay attention to the details.
Business associate audits make service providers open to HIPAA regulatory violations but may be a resource and budget boon for compliance officers.
More data, more problems? #GRCchat participants discuss new governance challenges and how to revamp an information lifecycle management strategy.
Former eBay CISO David Cullinane discusses why new threats make security-related information sharing an integral part of corporate data protection.