Will passwords soon become a thing of the past? Have they already become obsolete? This is perhaps one of the most prominent topics under discussion...
Search results for: 7 problem management

PCI DSS 3.0: Shifting focus on daily review of ‘security-relevant’ logs to identify suspicious activities [Part-3]
Ever since the release of the PCI DSS version 3.0 change highlights by the PCI Security Standards Council (PCI SSC), stakeholders of payment card industry and security analysts have been busy...
Why IT Dollars Will Go Further on Google’s Floating Data Center
Is Google preparing another “moon shot”? The barge discovered in the San Francisco Bay this week hints at it, and rampant speculation has Google building...

Where the cloud touches down: Simplifying DCIM
In most data centers, DCIM rests on shaky ground: manual record keeping and scattered documentation. Data center managers maintain–and wade through–wikis, spreadsheets, text files, and...

This Week’s Five: SysAdmins are not humans, seriously!
Your network is safe, your computer is working, and your printer is running. Why? Because you’ve a great sysadmin who is keeping your business up...
Open Source Software: The Hidden Cost of Free
Recently, Michael Skok wrote that “open source is eating the software world.” As general partner at North Bridge Venture Partners, Skok should know. He’s witnessed the power of open...

Apple and the Enterprise
The first ever computer for home use with a GUI was released by Apple in 1983, and was billed Lisa. Although Lisa was a failure, Apple...

This Week’s Five: Tune your bandwidth
This Week’s Five is the column where we bring to you a collection of five interesting reads from all over the web, with a different topic...

$45 million ATM heist turns focus again on insider threats, controlling privileged access!
New wave of cyber-attacks on banks lend credence to the belief that insider threat is getting complex and cyber-criminals are increasingly targeting to siphon-off the...