Today, everyone is talking cloud computing, but the issue of security continues to drive the conversation around corporate adoption. While it is obvious that startups have...
|
|
Vint Cerf, Google's Chief Evangelist and the "Father of the Internet," joins his longtime friend Larry Smarr, himself one of the technology heroes of the age, onstage for a...
|
|
I believe that everyone needs to hear Sir Richard's thoughts and cautionary comments on the subject of the Chinese People's Liberation Army attacking commercial and...
|
|
Privacy regulations are about to become one of the great constraining forces on e-commerce, and one of the final legal bastions of personal protection for individuals,...
|
|
The role of the Chief Risk Officer is to directly assess and holistically manage all aspects of risk brought to bear on the enterprise by IT security and...
|
|
In most cases, using a phased implementation approach for Security Policy allows enterprises to begin to reap policy benefits quickly without causing the massive culture...
|
|
This video introduces the key driver of personal and unmanaged applications (PUAs) and the potential long term application portfolio strategy to integrate these into the...
|
|
It is suddenly that time of year again: time to review past predictions, rank them, and create a new set, in the hope that, by being reasonably accurate, they will assist...
|
|
London, ON July 11, 2011 – Growing security and compliance concerns signal big growth in the awareness and adoption of SIEM solutions in the coming year, according to a...
|
|
About five years ago, Ray Ozzie, then newly anointed chief software architect at Microsoft, described the world he saw, from a security perspective, and the vision was...
|
|