Tagged - security

Privacy Protection: Going Global

Privacy regulations are about to become one of the great constraining forces on e-commerce, and one of the final legal bastions of personal protection for individuals,...

Chief Risk Officer

The role of the Chief Risk Officer is to directly assess and holistically manage all aspects of risk brought to bear on the enterprise by IT security and...

Security Policy Implementation Tool

In most cases, using a phased implementation approach for Security Policy allows enterprises to begin to reap policy benefits quickly without causing the massive culture...

Integrate Consumer Applications

This video introduces the key driver of personal and unmanaged applications (PUAs) and the potential long term application portfolio strategy to integrate these into the...

Top 10 Technology Predictions for 2012

It is suddenly that time of year again: time to review past predictions, rank them, and create a new set, in the hope that, by being reasonably accurate, they will assist...

Big Boom on the Horizon for the Security Information and Event Management Market According to Info-Tech Research Group

London, ON July 11, 2011 – Growing security and compliance concerns signal big growth in the awareness and adoption of SIEM solutions in the coming year, according to a...

Special Letter: Solving the Greatest Enterprise Security Threat

About five years ago, Ray Ozzie, then newly anointed chief software architect at Microsoft, described the world he saw, from a security perspective, and the vision was...

WatchGuard, SonicWALL and Barracuda are Champions in the Secure Socket Layer Virtual Private Network Market

London, ON – June 27, 2011 – A recent Vendor Landscape report evaluating dedicated Secure Socket Layer Virtual Private Network (SSL VPN) appliances published by Info-Tech...

Special Alert: IP Protection Warning

We have now been warning members of the dangers of a cyber attack on their corporate Intellectual Property for several years. We think the current level of threat has...

Economic Cyberwar: The New Security Mandate

In order to fully appreciate our concept of "Economic Cyberwar," one should start with the idea that the form of war preferred by mercantilist states is not militarist,...
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us