INFRASTRUCTURE

Subscribe
 

AETs: The Dirty Little Truth About Security

When it comes to security, every CIO experiences some level of angst and frustration. Despite growing investments in security, data breaches continue to regularly occur. A major reason is that digital miscreants of all types have access to advanced evasion techniques (AETs) which use a combination of evasion techniques, such as fragmentation and obfuscation, to bypass firewall and endpoint... Read More »

Digital Marketers Need More Centralized IT

Digital marketers are determined to expand their cross-channel campaigns in order to reach customers wherever they are, whether on the Web, social media, mobile devices and so on. However, marketer are struggling to make it happen due to tech-based barriers, according to a recent survey from Experian Marketing Services. CIOs must work... Read More »

Inside the NIST Framework to Improve Cybersecurity

President Obama's Executive Order 13636, "Improving Critical Infrastructure Cybersecurity," issued a year ago, established U.S. policy for maintaining a cyber environment that encourages "efficiency, innovation, and economic prosperity while promoting safety, security, business confidentiality, privacy, and civil liberties." The Order calls for a voluntary, risk-based cybersecurity... Read More »

Data Protection Without Hardware Investments

Thanks to Virtual Appliance, The Aldridge Company can protect data locally and replicate it to the cloud without the need to purchase any on-site hardware.

Read More »

Green Clinic's Healthy Approach to IT Support

A regional health-care clinic gives its IT support staff a booster shot through new technology and tools, which are also helping drive efficiency gains and cost savings.

Read More »

The Precarious State of the WAN

In the age of the global cloud computing, reliance on wide area networks (WANs) has never been greater. The challenges facing CIOs is that while networks have become much more robust in the last decade, there is still a considerable difference between what an enterprise IT organization might experience in terms of application performance across a WAN in an emerging economy than what is... Read More »

Coping With a Cloud Outage

Cloud computing presents enormous opportunities for the enterprise, but it's critical to proactively prepare for cloud outages as well as outright provider failures.

Read More »

How to Prepare Your Organization for a Disaster

Disasters arrive in many ways—from tornados to floods to ice storms to blizzards to wildfires to mudslides. (Not to mention those garden-variety power outages.) Frequently, they're not easy to anticipate, so organizations must be prepared for anything in advance. The stakes are high: 43 percent of companies that experience a major data loss do not reopen, according to industry... Read More »

Deluge of Data Threatens Many Backup Systems

When it comes to backup and recovery, IT organizations are clearly struggling with the amount of data that needs to be managed. A new survey of 200 IT professionals conducted... Read More »

Enterprise Is the Main Target of DDoS Attacks

Distributed denial of service (DDoS) attacks plague the enterprise sector more than any other sector, including commerce, according to Akamai's just-released "Third Quarter, 2013 State of the Internet Report." Every quarter, Akamai releases such surveys, which include data gathered from across the company's Intelligent Platform about attack traffic, broadband adoption, mobile conductivity... Read More »

Read More From Our Infrastructure Archive »