Insider

Get exclusive access to premium articles, product guides, reviews, how-tos, and more from CIO, CSO, Computerworld, InfoWorld, ITworld, and Network World - the best enterprise tech publications in the business. Register now!

Katrina’s surge resulted in 53 levee breaches
An interview lifesaver

research projects

4 research projects that could double wireless bandwidth

As compression and other existing bandwidth enhancement techniques reach their limits, academic researchers worldwide are investigating a variety of technologies and methods that promise to bring wireless broadband up to speed—and...

pat gelsinger

VMware CEO hits on network virtualization reality, feuding with Cisco & the EMC Federation's future

Heading into VMworld 2015, VMware CEO Pat Gelsinger discusses unified hybrid cloud networking, network virtualization, the company's feud with Cisco and the future of the EMC Federation.

top secret data protection security briefcase caution police tape

Review: How to protect top-secret data

In our tests, IQProtector’s file encryption tool successfully secured corporate documents from prying eyes.

making the case security

Law firm makes a case for security certification

A big law firm handling sensitive documents uses its ISO security certification as a competitive differentiator
.

measure piece photo

4 security metrics that matter

Today, management demands metrics to get a clearer view of security. Here are four metrics that deliver actionable insight -- and a few others with less value.

law technology court robot

Technology, the law and you: Open-source software

With one real exception, organizations shouldn’t have any legal issues to worry about when opting for open-source.

success it ts

How Georgia successfully overhauled IT

COO of Georgia Technology Authority discusses the sweeping enterprise-driven privatization push that's improved security, cut costs and upended the state's IT culture.

fight battle boxing

Review: VirtualBox 5.0 vs. VMware Workstation 11

VirtualBox 5.0's new features add ease and flexibility, but VMware Workstation 11 leads in performance and convenience.

picking a successor

CIO succession planning critical as IT drives business growth

CIOs say proper succession planning is a crucial part of their responsibilities. But it's not an easy job at a time when talented IT staff can rake in big salaries working on innovative projects, without putting themselves under the...

A team of people building a human tower

9 things you need to know to run a successful software development team

Experienced software engineering leaders share what it takes to get the most out of your team.

many tunnels

Send attackers on a wild goose chase with deception technologies

Deception is an information security approach for identifying and changing attacker behavior, tying up his time, and sending him packing.

A close-up of a colorful sticky notes on a Scrum board

Comparing scaling agile frameworks

As larger organizations scramble to apply agile software development methodologies to the challenges inherent in an enterprise-level company, it’s important to understand the pros and cons of the different approaches.

reports open source 5

The best open source reporting tools

Pentaho edges JasperReports and Eclipse BIRT is test of open source options for creating reports.

wooden roller coaster ride amusement park rise fall

Up, down, and out: 20 years of Internet Explorer

On IE's 20th anniversary, the story of the Web browser that had it all and lost its way.

usb thumb flash drive stick

Five signs an employee plans to leave with your company’s data

Predictive analytics plays a growing role.

binary data

Managing data in a mobile and cloud world

A simple strategy for standardizing metadata can improve decision-making, data governance and data security.

android umbrella

First Look: Dell Venue 10 is a hybrid for Android lovers

As a notebook, is the Venue 10 a contender for professional needs? In terms of price, the answer becomes iffy because, frankly, it runs up against several options in the market, most of which are Windows two-in-one devices, like the...

best practices

Hiring an information security vendor? Use these best practices.

Companies should take great care when hiring a party that will be granted access to its most sensitive systems and data.

Load More