Featured E-Zines
-
Information Security magazine
Information Security is the leading publication for enterprise security professionals, providing in-depth coverage of security technologies, practices and trends.
-
Latest Issues
Next-generation firewalls play by new rules
September 2013 Volume 15 / No. 7 Includes:- Firewalls play by new rules
- Cybersecurity: Global risk management moves beyond regulations
- Bridging the IT security skills gap
Unlock new pathways to network security architecture
July/August 2013 / Volume 15 / No. 6 Includes:- Enterprise mobile security by the numbers
- Unlock new pathways to network security architecture
- Third-party risk management: Horror stories? You are not alone
-
Network Evolution
Network Evolution magazine keeps IT professionals up-to-date on next-generation IT enterprise networking.
-
Latest Issues
Harvesting business intelligence with network monitoring tools
August 2013 / Vol. 4 / No. 4 Includes:- CIOs are laying SDN plans, but slowly
- The 802.11ad standard is fast, but do we need that much throughput?
- When network monitoring tools improve business intelligence
WAN optimization policy goes deep
June 2013 / Vol. 4/ No. 3 Includes:- WAN security vendor: To go network hardware provider or third-party?
- What is Ethernet-dedicated Internet?
- WAN optimization policy goes deep: Think, user, time, location
-
CIO Decisions
Enterprise CIO Decisions Ezine offers IT and business strategies and insights on the latest technologies making waves in the modern IT organization.
-
Latest Issues
Architecting the agile enterprise
Sept. 2013, Vol. 25 Includes:- Running a lean IT organization keeps CIO on budget, primed for growth
- CIO designs an iPad analytics app that mirrors work, speeds decisions
- Agile principles, for IT and across the enterprise
Putting a social layer into every business app
August 2013, Vol. 24 Includes:- Building a social enterprise means putting 'social' into the workflow
- Real-time data analytics drops a beat on the online music industry
- Building a social workflow process for today's enterprise no easy task
Security Management Strategies for the CIO




