Article January 4, 2016 Biggest Risks for Software Buyers in 2016 In our series of articles discussing predictions for 2016, executives give their opinions and advice… Di Freeze, Editor Love0
Article December 15, 2015 Biggest Risks for Software Vendors in 2016 In our series of articles discussing predictions for 2016, executives share their perspectives regarding what… Di Freeze, Editor Love0
Article November 16, 2015 Technology Becomes Pivotal Battleground in 2016 Technology has become a tool of today’s rapidly growing terrorist groups. As a result of… ksgoolsby Love0
Article August 11, 2015 Best Practices for VoIP Security Corporate VoIP systems are gaining ground, but with increased adoption come increased attacks and more… Di Freeze, Editor Love0
Article July 28, 2015 How Long Data Should be Kept in Warehouses: Two Sides of “Indefinite” Retention Now that data has proliferated and is much more challenging to manage on a personal… Di Freeze, Editor Love0
Article May 18, 2015 Fast-Growing Cybersecurity Firm Norse Corp. Goes Looking for Trouble Here’s how Norse Corp.’s dedicated threat-detection network blocks attacks before they target a network and… Di Freeze, Editor Love0
Article May 18, 2015 Enterprise Application Tiering with Hadoop Here’s how Hadoop, as an enterprise data management platform, reinvents information life cycle management and… Di Freeze, Editor Love0
Article May 5, 2015 IBM Security: Big Business for Big Blue Here’s why IBM Security is listed high on the Cybersecurity 500 list of the world's… Di Freeze, Editor Love0
Exec Briefing April 27, 2015 Data Breaches: An Inside Perspective This Omlis report looks at why traditional financial institutions are losing the battle against cybercrime. Di Freeze, Editor Love0
Article April 27, 2015 Technology Service Providers Moving to Relationship Model in Digital Customer Revolution Company executives say they are looking for these 11.5 key principles from their technology service… Di Freeze, Editor Love0