Making the IP voice decision, Enterprise VoIP, VoIP standards and protocols, VoIP migration strategies, Quality of Service (QoS) for VoIP, VoIP security, Enterprise communication applications, IP communications tools, Hosted VoIP, VoIP carrier market, VoIP for small business, Wireless networks, VoIP management, Network design, Network performance management, Routing and switching, Network administration, Network protocols and standards, Virtual private networks (VPNs), Network security, Networking career resources, Introduction to networking, Networking for small business, Wide area networks (WANs)
While the penny-a-gig Amazon Glacier service will make an impact on cloud archiving, it may not dominate the market.
Dennis Martin discusses the advantages of using the SR-IOV and MR-IOV specifications for I/O virtualization in this expert video.
News of a Nirvanix partnership filled in some details about Dell's cloud storage strategy, but the company still treats its cloud plans as a secret.
Version 3.0 of the Payment Card Industry Data Security Standard has few surprises, but a host of new requirements and challenges for merchants.
Enterprises rely on ERP and CRM systems, but they pose a risk if left unpatched. Michael Cobb reviews enterprise application security best practices.
The widespread iOS app vulnerability, which stems from the way many mobile applications handle caching, allows attackers to control an app's content.
Not all rogue IT is bad for business. Here, we look at how CIOs keep tabs of the tech outside of IT and handling risk.
The consumerization of IT and increasing demands for business agility are forcing the evolution of rogue IT. How are CIOs responding?
When thinking of rogue IT in today's enterprise, envision the Big Bad Wolf from Little Red Riding Hood.
Server virtualization, managed data centers and hosted software can affect your company's compliance controls. Here's how to overcome the obstacles.
An educational testing service firm gives high marks to an off-the-shelf security management tool to protect student data.
The underlying legal issues for SaaS contracts can be ticking time bombs if you don't pay attention to the details.
Combining compliance and security resources is difficult, but a company-wide risk assessment can help reduce redundant processes and improve GRC.
Brian Barnier, a keynote speaker at the GRC Summit in Boston this week, discusses the benefits of proactive risk assessment and crisis management.
In this #GRCchat recap, learn why remote device wipe is a good option for IT departments looking to safeguard data -- both corporate and personal.