The information security pro’s resource for keeping corporate data, applications and devices secure
Regulations, Standards, Negotiating and SLAs, PCI and the Cloud, Evaluating Providers, Incident Response
Private and Hybrid Clouds, IaaS, PaaS, SaaS, Public Clouds
Legacy Applications, Security Services, Networking, IAM, Data Protection, Patching
From Virtualization to the Cloud
E-Book from: SearchServerVirtualization
Corporate data in the consumer cloud
E-Book from: SearchConsumerization
Log management tightens data security and IT performance
E-Book from: SearchCompliance
Choosing and managing mobile devices
Compliance strategy 2.0: Comprehensive, scalable and sustainable systems
Presenting the pros and cons of server virtualization to management
Expert Nick Lewis explains how attackers are taking advantage of proxy auto-config capabilities in browsers and what mitigations can be put in place.
A new website built by Troy Hunt enables possible data breach victims to discover compromised accounts from several high-profile breaches.
With the CISO role being a new addition for many executive teams, expert Joe Granneman says there are several challenges facing security execs.
Learn about bandwidth management vendor Websense's partner program in this standardized checklist.
Learn more about configuration control software vendor Tripwire, Inc.'s partner program in this standardized checklist.
This section of the chapter excerpt focuses on supporting multiple administrative levels of router configuration.
In this video interview, Ian Kilpatrick of Wick Hill discusses the IPv6 challenges that small and medium businesses are just beginning to address.
Apache has released an updated version of its Web server to address a DDoS vulnerability, for which exploit tools have been found in the wild.
Learn how a Web-based free spam-filtering service can secure email and prevent spam from attacking your enterprise.
Cloud projects don't always maximize the potential benefits -- even after a launch. These sure-fire ways take advantage of a cloud migration.
Free Visual Studio Online tools give Azure developers source-code control and application lifecycle management capabilities.
In the past, mobile application developers were stuck on an island without tools. No longer, thanks to the effects of Backend as a Service.
Server power consumption can be readily controlled by hypervisors instead of the operating system once the host server is properly configured.
Constant refinements and upgrades can cause virtualization challenges -- such as VM sprawl -- but management tools can help smooth the process.
You may not be able to avoid a server fault, but you can mitigate its affect by distributing critical workloads across multiple physical servers.
The uptime demands of the business and budget considerations will influence what type of ESXi storage environment works best for your company.
Get familiar with the details and use these four steps to lock down hosts in your VMware virtualized environment.
Using VMware vCenter roles can eliminate security concerns while giving IT teams the access they need.