Featured E-Zines
-
Information Security magazine
Information Security is the leading publication for enterprise security professionals, providing in-depth coverage of security technologies, practices and trends.
-
Latest Issues
Unlock new pathways to network security architecture
July/August 2013 / Volume 15 / No. 6 Includes:- Enterprise mobile security by the numbers
- Unlock new pathways to network security architecture
- Third-party risk management: Horror stories? You are not alone
The rapid evolution of MDM solutions
June 2013 / Volume 15 / No. 5 Includes:- Are FedRAMP security controls enough?
- Big data analytics: New patterns emerge for security
- MDM products: More calls to secure a mobile workforce
-
Network Evolution
Network Evolution magazine keeps IT professionals up-to-date on next-generation IT enterprise networking.
-
Latest Issues
Harvesting business intelligence with network monitoring tools
August 2013 / Vol. 4 / No. 4 Includes:- CIOs are laying SDN plans, but slowly
- The 802.11ad standard is fast, but do we need that much throughput?
- When network monitoring tools improve business intelligence
WAN optimization policy goes deep
June 2013 / Vol. 4/ No. 3 Includes:- WAN security vendor: To go network hardware provider or third-party?
- What is Ethernet-dedicated Internet?
- WAN optimization policy goes deep: Think, user, time, location
-
CIO Decisions
Enterprise CIO Decisions Ezine offers IT and business strategies and insights on the latest technologies making waves in the modern IT organization.
-
Latest Issues
Putting a social layer into every business app
August 2013, Vol. 24 Includes:- Building a social enterprise means putting 'social' into the workflow
- Real-time data analytics drops a beat on the online music industry
- Building a social workflow process for today's enterprise no easy task
Turning dirty data into business insights for your customers
June 2013, Vol. 23 Includes:- Land O' Lakes CIO turns 'dirty data' into customer insights
- To be a better leader be a team player: CIO leadership lessons from a pro
- Can you have big data and personal data privacy?
Security Management Strategies for the CIO




