It was a tough week for dotcom nostalgia. First Sun Microsystems — the company that once claimed to have "put the dot in dot-com" —
If security vendors are to truly help customers strengthen theirinfrastructure, they need to take a page from the cybercriminals, ArtCoviello told the crowd at the
The Department of Defense (DOD) is using technology solutions to serve communities of interest. These communities need ways for their officers to manage semantically complex
Security gurus converged on San Francisco this week to discusspressing information security problems at the annual RSA Conference. Akey issue: how to leverage relatively flat
1. Tip 1: Plan Ahead to Avoid the "Dead Sea Effect" Dead Sea Effect: your best IT people leave, while the rest remain behind. Result:
Talking about “our business model” is a pleasant diversion. It was the diversion of the dot.com era, the fodder for venture capitalist pitches and the
For any government agency, a paradox has always existed when it comes to transactions involving contracted services: Vendors are owed payment for work delivered, but
FEATURE Is Your Information Really Safe?It has become increasingly evident that enterprises must upgrade their security practices in order to prevent data breaches. The consensus