Are you keeping your project pipeline in check? Review our recent stories and take our quiz to assess your knowledge of IT project management essentials.
Agile development guru Jim Highsmith makes the case to CIOs that adaptation is tantamount to business survival. Here is his prescription for adaptive leadership.
Listen up IT executives, it's time to stop pondering the IT skills gap and adapt leadership, training and recruiting styles to resolve it. IT and business strategist Harvey Koeppel explains how.
If you're wondering whether to use a software- or hardware-based network vulnerability scanner, take a look at your budget and network deployment.
We built a data center several years ago and are refreshing the IT equipment in it. Should I worry about how big and heavy my new cabinets will be for the existing structure?
The Open-IX data center certification aims at resiliency through self-declared certification and an annual renewal process, rather than proprietary oversight.
A10 gives users more ammunition in the never-ending battle to combat DDoS attacks.
User Activity Monitoring is as important as asset monitoring for enterprise network security, finds research from Enterprise Management Associates.
The Border Gateway Protocol does a lot of wonderful things. But there are steps you should take to ensure your IP routing is secure.
(ISC)2 Board Chairman Wim Remes, who is seeking re-election, details the organization's management changes and efforts to boost member engagement in this interview.
Sarbanes-Oxley Act compliance is important for firms to maintain. Expert Mike Chapple explains how to keep up with the new whistleblower update.
Industry observers say the unveiling of the Regin malware, which came after more than half a decade in the wild, highlights the need for better detection methods.
Software testers trying to identify performance problems in Java apps might be using the wrong requirements and tools. Two experts suggest ways to accurately pinpoint problems.
A recent survey shows software professionals have a basic understanding of application security concepts, but they lack the knowledge to fix the resulting security issues.
Learn some cloud application testing techniques to ensure data security.
Archiving data in place is becoming more attractive to enterprises because it allows data to be archived on the storage it already resides on.
Seagate beefs up ClusterStor storage systems acquired from Xyratex, with new Hadoop optimization tools, Lustre update and secure data appliances.
Analyst Jon Toigo explains why performing analytics on big data sets means that data is no longer considered cold, reducing the importance of archives.