insider News

  • Your ultimate guide to social engineering

    Posted February 28, 2012 - 2:10 pm

    Social engineering attacks security at its weakest link: People. Preying on employees' best intentions, social engineers gain unauthorized access to systems and information.
  • Your IT career: Making time for continuing education and career development

    Posted February 26, 2012 - 7:25 am

    Demanding full-time jobs, often coupled with hectic family responsibilities, prevent many IT professionals from pursuing the continuing education and professional development programs they need to remain relevant in the mercurial IT industry and competitive job market. But IT professionals who don't make time to take classes, study on their own, earn certifications or pursue advanced degrees risk becoming obsolete.
  • TD Bank unites 85,000-plus workers

    Posted February 19, 2012 - 3:12 pm

    TD Bank Group deployed IBM collaboration software to help its 85,000 employees collaborate more efficiently.
  • The future of hypervisors

    Posted February 7, 2012 - 8:36 am

    The world of hypervisors is complicated by the fact that there are proprietary and open source tools, each with different strengths and weaknesses.
  • CES 2012 in a nutshell

    Posted January 25, 2012 - 5:54 pm

    As technology conferences go, CES this year reached new heights of stardom, with its own television show on Spike TV and big entertainment names like Justin Bieber, Justin Timberlake, Kelly Clarkson and Ryan Seacrest.
  • LAPD drops Google Apps plan

    Posted January 13, 2012 - 4:26 pm

    After more than two years of work, the city of Los Angeles has abandoned its effort to migrate its police operations to Google's hosted email and office application platform because it says the service cannot meet FBI security requirements. Insider (registration required)
  • What does 2012 have in store for Anonymous?

    Posted January 11, 2012 - 8:08 am

    Anonymous in 2011 took on everything from HB Gary to a Mexican cartel, from oil companies to banks, from NBC to a transportation site. What have companies learned from this year of terror? The most that can be said is that corporate security needs to be shored up.
  • Mobile tactics could be key to 2012 election

    Posted January 9, 2012 - 11:36 am

    Analysts say candidates must improve their mobile tech plans to communicate with younger voters.
  • Mozilla to launch enterprise Firefox this month with 7X slower pace

    Posted January 6, 2012 - 3:44 pm

    Mozilla on Thursday said it will kick off a slower-paced Firefox release schedule for enterprises at the end of this month. Insider (registration required)
  • Online retailers turn to social networks for holiday profits

    Posted January 5, 2012 - 12:04 pm

    Retailers are going out of their way this year to integrate holiday season sales efforts with social networking sites to boost bottom line profits.
  • CIOs disconnected from business execs

    Posted January 3, 2012 - 4:59 pm

    CIOs and their fellow executives have conflicting priorities on cost and competitors, says our 2012 State of the CIO survey.
  • Cloud computing changes everything

    Posted December 26, 2011 - 9:05 pm

    The sheer number of cloud players - or companies that claim to be cloud players -- is staggering. By some estimates there are more than 2,000 software-as-a-service (SaaS) companies alone. At this early point in the cloud revolution, there are certainly front runners, but the field is wide open.
  • Resume makeover: How an enterprise architect can become a CIO

    Posted December 21, 2011 - 10:51 am

    Carlton Lassiter began looking for a new job five months ago, after being passed over for a director of strategic planning position with his current employer. His résumé just didn't succeed in giving hiring managers the impression that he was qualified. Lassiter needed a résumé makeover.
  • CA Technologies CEO William McCracken: Doing what the customer needs

    Posted December 15, 2011 - 9:52 pm

    William McCracken, chief executive officer of CA Technologies, explains how the concept of 'business service innovation' is driving CA's business.
  • 5 IT security breakthroughs promise to thwart threats

    Posted December 12, 2011 - 12:50 pm

    the world's top security labs — such as those operated by Symantec, VeriSign, McAfee, Kaspersky and Kindsight — are working on innovative countermeasures that will make their way to the gateway appliances used in data centers, and none too soon. Read on to learn about five approaches security experts are taking to help beat the bad guys.
  • What to do in the event of a data breach?

    Posted December 8, 2011 - 9:01 am

    Even though it now appears there was no terrorist attack on a pump at an Illinois water utility, the SCADA infiltration scare was a reminder that data breaches can come from any number of angles.
  • U.S. HPC lead in danger

    Posted December 6, 2011 - 5:00 pm

    The DOE's exascale program is stalled, and its prospects appear bleak at a time of budget-cutting fever.
  • Enterprises slow to join voice-recognition surge

    Posted December 5, 2011 - 5:50 pm

    Questions remain about whether or when enterprises will start widely deploying voice-recognition technology on mobile devices, partly because internally developed, specialized apps would have to be built to overcome issues like background noise that could corrupt its operation.
  • The inside story of why Puma dumped four cloud vendors for one

    Posted November 30, 2011 - 2:47 pm

    Puma simplified its cloud strategy and saved money by consolidating from using four cloud vendors down to just one. Here's what they did and why they did it.
  • The cloud security checklist

    Posted November 29, 2011 - 1:49 pm

    Whether you're a small business relying on Google Docs for document sharing or an enterprise moving your global ERP system to the cloud, you should demand that some common security and compliance requirements are met by vendors providing applications and services over the Web. These requirements involve who can access your applications and data, as well as the systems hosting them; where the data is stored; and whether the data is hosted on dedicated, rather than on shared, hardware. They also ensure that you get detailed logs of who has accessed your data and applications so that you meet corporate and regulatory standards, and they verify that data is properly encrypted -- a factor that's more critical outside the corporate firewall.
  • Crafting a successful BYOD and mobile IT strategy

    Posted November 22, 2011 - 11:25 am

    The consumerization of IT trend's leading wave is the use of personal mobile technology, so a smart BYOD strategy lays the groundwork for a complete consumerization approach
  • Exclusive research shows CIOs embrace consumerization of IT

    Posted November 18, 2011 - 5:50 pm

    With BlackBerry and Apple still leading the pack, and tablets and Android rising in the ranks, CIOs surveyed by CIO magazine are widely supporting employee-owned devices
  • Cisco how-to guides for firewalls, IPv6, contact centers and security exams

    Posted November 16, 2011 - 6:20 pm

    If you're ready for a technical deep dive in a book, the Cisco Networking Technology Series provides that in its collection of volumes on topics that include Cisco firewalls, Cisco Unity Connection voice-messaging platform, Cisco Contact Center, IPv6 and more. Here's a quick review of the books published in this series by Cisco Press this year.
  • IBM quietly names a new CEO

    Posted November 9, 2011 - 10:12 am

    IBM doesn't like drama -- and it proved that with its recent appointment of Virginia Rometty as its new CEO.
  • Smartphones, social media tied into ELERTS emergency system

    Posted November 8, 2011 - 10:27 pm

    Chris Russo, deputy fire chief in the Massachusetts coastal town of Hull, launches ELERTS, an emergency communication system that uses smartphones and social media to communicate with first responders and other emergency personnel.
Join us:






Join today!

See more content
Ask a Question