Feeds

Mail to the chief: cyber with President Clinton tonight

"Who's yo' Daddy?"

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

Newsblurt: The gigolo-in-chief will be available for a 90-minute on-line chat session tonight at http://townhallmeeting.excite.com starting at 7:00 pm EST. Register your nick early enough, and you might get on as Monica_Lewinski_28500... ®

Internet Security Threat Report 2014

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.