Security

A Cheat Sheet on Security Monitoring in the Enterprise
Take these steps to ensure that monitoring is effective and meeting business needs.
Botnets: The Biggest Threat to Enterprise Security
Malware-infected devices on an enterprise network can wreak havoc.
5 Tips for Securing Windows Desktops
Follow these tips to reduce the likelihood of a security incident and help keep support costs low.
Teach Users to Treat Passwords Like Money — Quick Take
The sanctity of user passwords needs to be ingrained in users’ minds by IT workers.
Review: Fujitsu PalmSecure Sensor
The Fujitsu PalmSecure Sensor is a contact-free biometric device that’s suited for hygienic authentication.
Subway Franchisees Learn the Value of PCI DSS — Quick Take
Complying with the security standard could've saved some businesses from a POS hack.
Don’t Forget the Spare Keys to Your IT — Quick Take
Leaving the keys to the IT kingdom with one person is a mistake.
Multifactor Authentication Made Simple
Understanding identification, authentication and authorization is critical to understanding access control systems.
Breaking News – BizTech Quick Take
Your network security might be more at risk from general news searches than objectionable content.
Anatomy of a Spam Attack
Avoid these scams by exploring the sender’s motivation and technique.
What Your Business Can Learn From the 25 Worst Passwords of 2011
Make password protection policy a priority in your organization.

Security

Securing the Internet of Thi... |
As excitement around the connected-device future grows, technology vendors seek ways to...
Tools to Maintain Mobile Sec... |
Far-flung devices pose serious challenges, but a variety of technologies can help protect...
Edward Snowden Personifies t... |
The NSA leak shows critical areas where organizations can better protect their data.

Storage

The New Backup Utility Proce... |
Just getting used to the Windows 8 workflow? Prepare for a change.
How to Perform Traditional W... |
With previous versions going unused, Microsoft radically reimagined the backup utility in...
5 Easy Ways to Build a Bette... |
While large enterprises have the resources of an entire IT department behind them, these...

Infrastructure Optimization

The Value of Converged Infra... |
Improvements in security, management and efficiency are just a few of the benefits CI can...
Curse Builds a Private Cloud... |
One of the top resources in online gaming builds out a robust infrastructure that can...
SDN at the Forefront of HP’s... |
Computing giant kicks off Interop 2014 with a series of announcements aimed at turning...

Networking

Securing the Internet of Thi... |
As excitement around the connected-device future grows, technology vendors seek ways to...
How to Maximize WAN Bandwidt... |
Understand six common problems that plague wide area networks — and how to address them.
Linksys Makes a Comeback in... |
The networking vendor introduced several new Smart Switch products at Interop this week.

Mobile & Wireless

Now that Office for iPad Is... |
After waiting awhile for Microsoft’s productivity suite to arrive, professionals who use...
Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.
Linksys Makes a Comeback in... |
The networking vendor introduced several new Smart Switch products at Interop this week.

Hardware & Software

Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.
The Tools That Power Busines... |
Ever-evolving analytic software can greatly improve financial institutions’ decision-...
XP-iration Date: Today Is th... |
It’s officially lights out for Windows XP as an operating system. Here’s how the world is...