91ÖÆÆ¬³§

Tagged - security

Special Letter: Finding Security in the Cloud

Today, everyone is talking cloud computing, but the issue of security continues to drive the conversation around corporate adoption. While it is obvious that startups have...

Safety on the Net: Authentication, Pseudonymity, and Resilience vs. Increasing Threats

Vint Cerf, Google's Chief Evangelist and the "Father of the Internet," joins his longtime friend Larry Smarr, himself one of the technology heroes of the age, onstage for a...

International Challenges to Innovation Protection

I believe that everyone needs to hear Sir Richard's thoughts and cautionary comments on the subject of the Chinese People's Liberation Army attacking commercial and...

Privacy Protection: Going Global

Privacy regulations are about to become one of the great constraining forces on e-commerce, and one of the final legal bastions of personal protection for individuals,...

Chief Risk Officer

The role of the Chief Risk Officer is to directly assess and holistically manage all aspects of risk brought to bear on the enterprise by IT security and...

Security Policy Implementation Tool

In most cases, using a phased implementation approach for Security Policy allows enterprises to begin to reap policy benefits quickly without causing the massive culture...

Integrate Consumer Applications

This video introduces the key driver of personal and unmanaged applications (PUAs) and the potential long term application portfolio strategy to integrate these into the...

Top 10 Technology Predictions for 2012

It is suddenly that time of year again: time to review past predictions, rank them, and create a new set, in the hope that, by being reasonably accurate, they will assist...

Big Boom on the Horizon for the Security Information and Event Management Market According to 91ÖÆÆ¬³§

London, ON July 11, 2011 – Growing security and compliance concerns signal big growth in the awareness and adoption of SIEM solutions in the coming year, according to a...

Special Letter: Solving the Greatest Enterprise Security Threat

About five years ago, Ray Ozzie, then newly anointed chief software architect at Microsoft, described the world he saw, from a security perspective, and the vision was...
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us