Editors' Picks
-
Big data applications require new thinking on data integration
Big data environments can ease data integration rigidity. But that also means more complexity -- and, perhaps, a need for new skills and processes.11 Sep 2013
-
BYOD adoption in SMBs: Confronting trouble, growing the business
BYOD adoption in SMBs preceded such initiatives in many enterprises, but that doesn't mean the road isn't rocky. Read how to overcome BYOD challenges.06 Sep 2013
-
BYOD benefits and challenges in the SMB sphere
Many SMBs embraced BYOD before enterprises did, and research shows these initiatives are on the rise. Learn how BYOD benefits SMBs' mobile strategies.06 Sep 2013
-
Forrester to security leaders: Embrace continuous improvement
Security leaders realize that changing attitudes about data security takes time; continuous improvement can be powerful tool in getting there.04 Sep 2013
-
New role for NAC? Endpoint visibility enables contextual security
Network access control is dead. Long live endpoint visibility, access and security. New acronym, slightly different product.09 Aug 2013
-
Forrester: Reengineering a CRM strategy for the age of the customer
Forrester lays out five steps to a sound CRM strategy in the age of the customer.26 Jul 2013
-
Seven steps to building an effective incident response program
Often undervalued, a well-thought-out incident response program for security breaches gets its due in this tip by Forrester Research.02 Jul 2013
-
Cloud security risks still an issue for CIOs, but change is in the air
Cloud security risks have been a barrier to adoption for CIOs, but self-education along with enlightened vendor response is easing the move to cloud.20 Jun 2013
-
Forrester CXi shows CIOs key to improving customer experience
Companies that excel at customer experience work hand in glove with CIOs and IT, according to the Forrester 2013 Customer Experience Index.29 May 2013
-
As IT pervades the enterprise, here comes the chief procurement officer
The rise of the chief procurement officer raises questions about the role of IT.22 May 2013
-
As IT pervades the enterprise, here comes the chief procurement officer
The rise of the chief procurement officer raises questions about the role of IT.15 May 2013
-
As IT pervades the enterprise, here comes the chief procurement officer
The rise of the chief procurement officer raises questions about the role of IT.15 May 2013
-
Offboarding automation reduces risk, manual labor
With HR's focus on onboarding, the offboarding process often gets short shrift. But making do with checklists and spreadsheets can lead to problems.09 May 2013
-
Putting a price on information: The nascent field of infonomics
Companies are behaving as if information has a monetary value. The question is how much? The nascent field of infonomics aims to provide answers.08 May 2013
-
Putting a price on information: The nascent field of infonomics
Companies are behaving as if information has a monetary value. The question is how much? The nascent field of infonomics aims to provide answers.06 May 2013
-
Analyzing recent developments in the backup software market
Switching backup software products can be a hassle, so it helps to know your options. This article looks at changes in the backup software market.18 Apr 2013
-
The rise of SOA: Integration gateways converge
A SOA integration gateway can help ensure security policies are enforced.12 Apr 2013
-
How to secure applications with SOA application gateways
Secure applications are increasingly important as organizations open content to third parties.11 Apr 2013
-
Forrester VP says enterprise mobile applications miss the mark
Building an enterprise mobile application may not be the right focus for today's enterprise application development teams.05 Apr 2013
-
Navigating SOA appliances: How to choose the right one
With the help of an SOA appliance, organizations can more easily secure message exchanges across internal lines of business and with third parties.05 Apr 2013
Security Management Strategies for the CIO