Topics
- All
- Security (80)
- Networking (15)
- Browser (6)
- Social Enterprise (6)
- Hardware (5)
- Software (5)
- Data Centers (4)
- Data Management (4)
- Wi-Fi (4)
- Education (3)
- Emerging Tech (3)
- It Employment (3)
- Storage (3)
- Web Development (3)
- Windows (3)
- Banking (2)
- Collaboration (2)
- Disaster Recovery (2)
- Government (2)
- Health (2)
- Laptops (2)
- Leadership (2)
- Legal (2)
- Malware (2)
- Pcs (2)
- Processors (2)
- Project Management (2)
- Servers (2)
- Virtualization (2)
- After Hours (1)
- Apps (1)
- Broadband (1)
- Cloud (1)
- Enterprise Software (1)
- It Policies (1)
- Linux (1)
- Mobility (1)
- Piracy (1)
- Printers (1)
- Privacy (1)
- Smartphones (1)
- Software Development (1)
- Tablets (1)
Content Types
About 191 results
-
Apple Touch ID: Do security advantages outweigh risks?
Tom Olzak examines the security pros and cons associated with Apple's fingerprint authentication technology on the new iPhone 5s.
-
Update security policies to protect VMs
Tom Olzak recommends specific updates that address the security of your virtualized environment that may not be in traditional security policies.
-
COBIT 5 for information security: The underlying principles
COBIT 5, a governance model for enterprise IT, introduces a framework that is better focused on information security.
-
Cyberwarfare: Mounting a defense
Both private and public organizations are at risk for cyberwarfare attacks and must take responsibility for network defense. Tom Olzak outlines security best practices.
-
Cyberwarfare: Characteristics and challenges
The specter of cyberwarfare isn't just a problem for governments -- many types of organizations could be in the line of fire. Knowing the types of attacks and their probability wil...
-
Meeting the BYOD and cloud challenges to business continuity plans
Here are solutions and recommendations for business continuity plans that must be changed to respond to the new risks associated with BYOD and cloud services.
-
Three challenges that BYOD and the cloud pose for BCP planning
BYOD and the emergence of cloud services present new challenges to business continuity planning. Here are the areas that will need to be addressed in any new plan.
-
The elements of business continuity planning
Whether you are creating a business continuity plan from scratch or updating an existing one, know what these elements mean to your recovery objectives.
-
Insider threats: Implementing the right controls
Tom Olzak describes the signs that an employee might become an insider threat and recommends the various controls and monitoring that can be implemented to mitigate such threats.
-
Manage insider threats: Knowing where the risks are
Tom Olzak details the insider threats that an organization should be prepared to defend.