The Agony and Ecstasy to eDiscovery
By Sonny Discini | Article Published September 14, 2010
When a company faces litigation, understanding the complexities of eDiscovery becomes critical.
How Does Social Media Affect the Enterprise?
By Sonny Discini | Article Published August 6, 2010
By combining all of a staff member's friends, colleagues and family members into one cohort, social networks create new challenges.
Improving Security Through Regulatory Compliance
By Sonny Discini | Article Published July 16, 2010
The expense of regulatory compliance is burdensome to businesses, yet it does offer some advantages.
Cybersecurity Metrics That Matter
By Sonny Discini | Article Published June 17, 2010
Security professionals need to be aware of metrics like percent of patch saturation over time and security events by demographic, as well as other key measuring points.
Cloud Computing and the New Network Center
By Sonny Discini | Article Published May 21, 2010
Cloud computing is turning the network operation center, formerly static and always in-house, into a porous, fluid concept, and the trend seems only to be gaining more momentum.
Is Your IT Security Budget Sustainable?
By Sonny Discini | Article Published May 14, 2010
IT security spending soared earlier in the decade. Now that a leaner ethos prevails, can you keep your technical infrastructure secure?
Smartphones and Security Don't Mix
By Sonny Discini | Article Published April 22, 2010
Smartphone security is plagued by a profusion of free apps and vulnerabilities caused by GPS, among other concerns.
Using Sender Policy Framework to Fight Spam
By Sonny Discini | Article Published August 24, 2009
Sender Policy Framework, or SPF, is getting a lot of buzz as a solution to spam.
Guide to Protect Against Malware in Enterprise
By Sonny Discini | Article Published April 29, 2009
Companies have cut back yet the need to guard against malware is as serious as ever.
When the Cloud Storms on You
By Sonny Discini | Article Published August 29, 2008
Will recent high profile outages halt cloud computing's rise or can enterprises learn to roll with the punches?
GRC Tools Promise an Escape from Compliance Chaos
By Sonny Discini | Article Published July 28, 2008
GRC solutions promise to put an end of regulatory compliance headaches. A tall order indeed.
Re-imagine IT: Energy Costs, Security and the Road Ahead
By Sonny Discini | Article Published May 30, 2008
A global energy crisis is forcing many to readjust their business processes. But it's not necessarily a bad thing for adaptive enterprises that take security seriously.
Is PCI-SSC Securing the Enterprise or Lining Pockets?
By Sonny Discini | Article Published April 28, 2008
Devised as a way to extend security and lend confidence to the payment card services industry, PCI standards are hardly deterring crafty crooks and merchants are paying the price.
Security Myopia and Brushes with C-Level Insanity
By Sonny Discini | Article Published March 10, 2008
Network security as you know it is undergoing fundamental changes. Distressingly, after spending some time with security "practitioners," our writer discovers a sad case of C-Level shortsightedness.
What Will You Do When IT No Longer Needs You?
By Sonny Discini | Article Published December 31, 2007
It's safe to say that plenty of iPhones and other powerful portables emerged from gift boxes this holiday season. Our author examines the implications of this new era of user-centric, cloud-enabled computing for IT workers, enterprises, and network providers.
Cybersecurity: Laws Only Go So Far
By Sonny Discini | Article Published September 10, 2007
The U.S. government is finally taking cybersecurity seriously in the form of new legislation but businesses shouldn't expect it to become a cure-all.
Ubuntu 7 - A Viable Windows Desktop Replacement?
By Sonny Discini | Article Published April 28, 2007
Why all the hype? A feature-packed OS with a user friendly interface and the stability of Linux. Fire it up and see if it makes a believer out of you too.
IT, Security and the Legalese of Compliance
By Sonny Discini | Article Published January 31, 2007
You work in IT, not at a law firm. Nonetheless, techies are starting to get caught between securing their organizations and regulatory compliance requirements.
Above and Beyond
By Sonny Discini | Article Published December 26, 2006
Youre always willing to lend a hand. But when it comes to support that falls outside of your purview, that altruism can be repaid with a poor job evaluation.
The PCI Noose is Tightening
By Sonny Discini | Article Published November 6, 2006
Security requirements are getting more stringent for credit card transaction firms and will ultimately ensnare their clients.
A Very (Un)Merry XSS-mas
By Sonny Discini | Article Published October 2, 2006
As the holiday season nears, droves of shoppers will go online. Lying in wait, however, are online criminals. A look at why locking down ports and hoping for the best isnt enough to keep users safe.
NAC: Compliance Cure or Complication?
By Sonny Discini | Article Published August 2, 2006
Before resting your hopes on a pricey network access control cure for your compliance headaches, it pays to know exactly what the technology offers.
Feature Rich, Quality Starved
By Sonny Discini | Article Published June 30, 2006
A handy checklist on how to spot the warning signs of products that overreach at the cost of your IT department's productivity and the efficacy of your security platforms.
Have Mobile Devices Punched a Hole in Security?
By Sonny Discini | Article Published April 26, 2006
For every portable device that enters the workplace, a new attack vector sprouts up. Sound policies, an informed IT staff and a well-trained workforce can minimize the risk.
Make Way for Business Process Security
By Sonny Discini | Article Published March 31, 2006
Compliance threatens to splinter corporate security. How will it affect your IT department? More importantly, which direction will your career in security take?
Security Gaffes Rattle Politicians and Shareholders
By Sonny Discini | Article Published November 2, 2005
Thanks to some high-profile incidents, computer security is attracting the attention of Washington and Wall Street. A look at how some sloppy practices have led to profound changes in the way business is to be conducted going forward.
Deployment Disasters: What Can You Do?
By Sonny Discini | Article Published September 29, 2005
A botched deployment is not only a waste of time and money, it can also throw your IT workforce into chaos. Sonny Discini offers a lesson in how to navigate this technical and political minefield.