Searched for: "building and implementing a successful information security policy"
- Security (10)
- Networking (4)
- Banking (3)
- Enterprise Software (3)
- Leadership (3)
- Collaboration (2)
- Education (2)
- It Policies (2)
- Social Enterprise (2)
- Software (2)
- Virtualization (2)
- Disaster Recovery (1)
- Google (1)
- Google Apps (1)
- Ipad (1)
- Legal (1)
- Linux (1)
- Web Development (1)
- Windows (1)
About 54 results for "building and implementing a successful information security policy"
Virtual Desktop Integration is a sweeping trend with tangible results. It's not without a few pitfalls as well, however. Learn some mistakes to avoid in your VDI implementation.
COBIT 5, a governance model for enterprise IT, introduces a framework that is better focused on information security.
FlashPanel is a Google Apps add-on from BetterCloud which can improve security and management capabilities.
This is the second of a three part series discussing the options available to deploy and/or administer Google Chrome in the organization.
Guest contributor Jeanne Morain outlines four steps of a business service approach to migrating applications to the cloud.
Dominic Vogel asks a researcher and a vendor to explain what behavioral monitoring adds to an organization's security strategy.
Generally one starts from the actual assessment of immediate-to-long-term needs assessment of the organization. I'm not suggesting delving into an organizational study or anything...
iPhones and iPads are top of the pile for consumers but enterprises may take a different view...
Corporate intranets offer an effective way to promote communication and collaboration within an organization -- but only if they're designed and maintained with users' needs in min...
The book that made the term "hacker" popular is still relevant, and the ethic it identifies is still influential -- perhaps more now than ever. Chad Perrin reflects on Steven Levy'...