Botnet infections are an increasing threat to enterprise IT security, so don't be caught catching up. These five steps can help with malware defense.
New Internet Explorer settings can tighten enterprise security, but only if Group Policy is properly enabled in IE 11 and you have Windows 8.
These five capabilities of Security Accounts Manager, which is built into Windows, can help IT manage and enforce enterprise password management.
Part two of this SearchCIO Trailblazer profile delves into the challenges associated with doing social analytics and explains how CIOs can help.
A tweet analysis of teen smoking gives CIOs a window into the critical role IT can play in a company's social media marketing.
Chatter about big data reveals IT self-service can be a gift for CIOs. Take command and control but keep the buffet open.
In today's growing DaaS market, it's important to look at the costs of cloud-hosted desktops and determine whether it's effective over in-house VDI.
It's VDI vs. DaaS in this East Coast-West Coast rapper feud between two of our contributors. Which prediction about virtual desktop technology will win out?
A Mainframe2 demo of NVIDIA GRID running AutoDesk Inventor shows the real benefits of virtualized GPU technology.
Fluke AirMagnet's new cellular spectrum security capability, coupled with Wi-Fi monitoring, can help regulated enterprises ensure compliance.
In this week's blogs, analysts point out weaknesses in enterprise security systems and offer insight into Microsoft's increased global presence.
Networking expert Glen Kemp reveals five ways to optimize the efficiency of your campus LAN.
VMware vCAC gives virtualization administrators the ability to better manage infrastructure orphans they inherit and stay out of the way of business.
The uptime demands of the business and budget considerations will influence what type of ESXi storage environment works best for your company.
Get familiar with the details and use these four steps to lock down hosts in your VMware virtualized environment.
In the December 2013 Beyond the Page, John Pirc explains why breach detection systems are an essential security tool in a malware-infested world.
Rampant backdoors in enterprise IT products too often provide unauthorized access to attackers and governments. Learn how to defend against the risks.
Breach detection systems, a tier-two security technology, identify malware in transit and help you detect unknown breaches and side-channel attacks.
What metrics should you use to measure the quality of multichannel customer service? This tip by Denis Pombriant explores multichannel CRM metrics.
The year is almost over, so it's time to look back and reflect on what mattered to the CRM industry in 2013 -- and look ahead to the future.
Employee social networks: Improving collaboration and solving problems together? Or a giant waste of time? Read how one call center made it work.