In Security, There’s No Second Chance
Now, more than ever, you need good sense on how to protect your company’s data and networked communications. Luckily, there is good advice out there.
Now, more than ever, you need good sense on how to protect your company’s data and networked communications. Luckily, there is good advice out there.
The greatest challenge you face as a technology manager in a large enterprise is that most of what you do is damn invisible. It’s like
Four weeks after the World Trade Center and Pentagon disasters, about 5,500 information technology executives from the Western Hemisphere braved long lines and toughened security
For Joseph Noviello, September 11 began at 6:30 a.m. with a phone call confirming that an annual fishing trip with colleagues at the Cantor Fitzgerald
In an ideal world, planning for business continuity would be simple: Reproduce your entire IT infrastructure in triplicate, with live operations, a nearby hot site
Harriet EdelmanChief Information OfficerRole: Edelman, a 22-year Avon veteran, rose through the ranks to become CIO in January 2000. She’s done it all, from helping
IBM commerce software running on Sun Solaris servers: Many assume from the outset that the combination is a kludgeif not a disasterwaiting in the wings.
Problem: Connections with customer networks lost While eSpeed’s engine for matching trades remained up and running, all connections to customers’ private networks ran through optical