Editors' Picks
-
Prescriptive analytics is coming to a future near you
It is only a matter of time before algorithms rule the world. Humans, meet prescriptive analytics.07 Aug 2013
-
Prescriptive analytics is coming to a future near you
It is only a matter of time before algorithms rule the world. Humans, meet prescriptive analytics.31 Jul 2013
-
IT consulting market outlook: It's growing, but slowly
While IT consulting market bellwether Accenture had a disappointing third quarter, the sector in general looks to be on a growth track.17 Jul 2013
-
GE, Pivotal and Amazon collaborate on the Internet of Things
GE, Amazon and Pivotal have put the Internet of Things into action to make machines smarter with implications for medicine, manufacturing and more.20 Jun 2013
-
Prepare for Shamoon malware with data backup and recovery plan
Expert Nick Lewis discusses how to detect Shamoon malware and emphasizes the importance of detailed data backup and recovery plans.19 Feb 2013
-
HR analytics early adopters say meaningful metrics, narratives are key
Identifying meaningful metrics and constructing data narratives are keys to success in HR analytics initiatives, speakers at an HCI conference say.12 Feb 2013
-
The story of five CIO entrepreneurs in India
Planning to start your own business? Let the story of these five Indian CIO entrepreneurs provide you with the inspiration you need.26 Nov 2012
More Like This
-
Global Procurement and Supply Chain Management for the Oil and Gas Industry Conference
June 3-5, 2013
Houston, TX
18 Apr 2013 -
Facebook's datacentre carbon footprint and greenhouse gas emissions rise
Despite its focus on energy efficiency and use of renewable energy resources, Facebook’s datacentre carbon footprint increased 52% in 201202 Aug 2013
-
Identifying and locking down known Java security vulnerabilities
Expert Michael Cobb discusses why known Java security vulnerabilities are on so many endpoints and how to contain them -- without updating Java.08 Aug 2013
-
Advanced threat-detection products emerge: Benefits and challenges
Traditional security tools are no longer sufficient for defending against new breeds of attacks, forcing advanced threat-detection products to emerge.06 Aug 2013
-
Emerging threat detection techniques and products
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing problem, penetrating networks and stealing intelle...26 Jul 2013
-
IBM and Shell use data analytics to find more oil and gas
IBM and oil company Shell are collaborating on a research project to use predictive analytics to identify possible oil and gas reserves. Predictive...26 Feb 2010
-
Slideshow: Five common Web application vulnerabilities and mitigations
Expert Michael Cobb analyzes five common Web application vulnerabilities from the OWASP top 10 list and provides mitigations for enterprises.15 Jul 2013
-
How to define SIEM strategy, management and success in the enterprise
Enterprise SIEM technology is as functional, manageable and affordable as it's ever been. Learn how to achieve success with SIEM in your organization.22 Jul 2013
-
Two-factor authentication options, use cases and best practices
It may seem daunting, but two-factor authentication options are manageable for nearly all enterprises. Learn how to get started in this 2FA primer.11 Jul 2013
-
How to plan for and mitigate a Barracuda vulnerability
Learn how to lock down a back-door vulnerability on Barracuda security devices and prevent attackers from accessing management accounts.08 Jul 2013
-
FortiGuard Labs sees fast rise of mobile malware in 2013
FortiGuard Labs reports a 30% increase in mobile malware so far in 2013, and cautions ransomware is also making an appearance on mobile devices.07 Aug 2013
-
Lavabit, Silent Circle close secure email rather than spill the goods
Lavabit and Silent Circle, both providers of secure communications for the consumer market, close under threat of U.S. government meddling.09 Aug 2013
-
Neohapsis: IPv4 plus IPv6 enables man-in-the-middle attacks
Neohapsis' Scott Behrens explains how having both IPv4 and IPv6 Internet protocols enabled can lead to man-in-the-middle attacks.09 Aug 2013
Security Management Strategies for the CIO