Cash-in on old IT equipment
Some organizations can earn a profit, or at least reduce the amount they have to pay to dispose of IT equipment, by allowing providers of IT disposal services to sell the assets they take away.
Some organizations can earn a profit, or at least reduce the amount they have to pay to dispose of IT equipment, by allowing providers of IT disposal services to sell the assets they take away.
Information technology departments that practice asset management are learning to master the art of retiring hardware at the right time. But making the decision to retire IT gear is just the beginning; tech managers must then figure out what to do with the systems that are past their prime.
A university network brought to its knees when someone inadvertently plugged two network cables into the wrong hub. An employee injured after an ill-timed entry into a data center. Overheated systems shut down after a worker changes a data center thermostat setting from Fahrenheit to Celsius.
Cloud computing is poised to win the title of most popular, and populist, buzzword of 2009.
Dan Kaminsky, who for years was ambivalent about securing DNS, has become an ardent supporter of DNS Security Extensions.
These forward-thinking IT managers are working at dismantling the stereotype of the risk-averse security professional-cum-business foe. How? By showing business colleagues they understand company operations and appreciate corporate goals.
Anti-data leakage vendors make bold claims about how far their products can go to protect enterprises from unauthorized information sharing. This irks Nick Selby, head of enterprise security research at The 451 Group, who believes these tools are helpful with some tasks, but far from "the solution."
The rapid consolidation in the anti-data leakage market in the past year is enough to make an IT manager's head spin: This segment of the security sector ballooned to include dozens of start-ups, then even more quickly dwindled down to a few independent companies as larger vendors cherry-picked smaller ones to add data leakage to their own product portfolios.
Those who commit cybercrime know they need to stay on the cutting edge of technology to come up with new and different ways to swindle people. Luckily, the good guys are also spending time in research labs developing ways to thwart the latest tricks employed by spammers, phishers and other criminals.
With targeted phishing attacks on the rise, it's no surprise that cybercriminals are doing their research and aiming at those with the most to lose -- executives.
A father-son team that has dedicated time and energy to fighting spam says that as of today, it has shut down more than 50,000 Web sites that use unwanted messages to lure traffic.
A new spam campaign has emerged that tells stories of the hard-knock life, and then asks for money.
US Congressman Ron Paul is hot. Image spam is not.
The path from CISO to executive team may not be a well-tread one, but breaking out of the security box and into the board room can be achieved by thinking about business.
The 80,000-square-foot building will double the size of the SDSC's facilities; besides an additional 5,000 square feet of data-center space, the expansion will house classrooms, offices, meeting rooms and a 250-seat auditorium.