Top Security Stories: What You Need to Know
Baseline‘s 5-Step Security Survival Guide How to develop and manage a world-class security infrastructure—and justify the investment to your bosses. No. 1: Detect the Initial
Baseline‘s 5-Step Security Survival Guide How to develop and manage a world-class security infrastructure—and justify the investment to your bosses. No. 1: Detect the Initial
Google’s CEO Eric Schmidt thinks everybody’s getting it wrong about the recently announced blockbuster ad deal between Yahoo and online marketplace eBay. Schmidt argues it
A three-judge appellate panel stated May 26 that bloggers can protect the anonymity of sources, reversing an earlier decision in the case of Apple Computer
IBM introduced next-generation enhancements to its storage “virtualization engine” software May 25improvements that help companies move large amounts of data over greater distances at higher
Ready for takeoff: Our survey of 45 emerging technologies finds team collaboration tools, business process platforms/management suites, server virtualization, and open source databases, development tools
Do you have what it takes to move upward in your IT career? Or enough juice in the skills department to weather an outbreak of
Valence Media, which operates the file-sharing portal site TorrentSpy, has accused the Motion Picture Association of America of hiring a computer hacker to help garner
A gaping security flaw in the latest versions of Symantec’s anti-virus software suite could put millions of users at risk of a debilitating worm attack,
So today Ken Lay and Jeff Skillings were were found guilty on all counts. One of the great business lessons in this whole mess (aside