Six tips to end SQL Injection attacks

These tips are just the tip of the iceberg for what you need to do to stop SQL Injection attacks. For detailed advice, see this article by Paul Litwin, as well as this

Published on: August 12th, 2014 Howard Solomon

Make your organization a digital leader

Published on: August 5th, 2014 Howard Solomon

Five BYOD best practices

Published on: July 29th, 2014 Howard Solomon

The IT asset manager as hero

Published on: July 22nd, 2014 Howard Solomon

Here comes the Internet of Things

Leading up to our Internet of Things Twitterchat on July 30, here are a few facts and figures gleaned from two recently-issued reports on the IoT that CIOs and IT managers should keep

Published on: July 15th, 2014 Howard Solomon

Best tablets for business

Published on: July 8th, 2014 Paolo Del Nibletto

Top 10 business ultrabooks

Published on: June 30th, 2014 Alex Davies

Answers to your CASL questions

Published on: June 24th, 2014 Nestor E. Arellano

Five takeaways on privacy

When organizations create online privacy policies they have to first follow the legislative and regulatory rules that apply to them. There's also the concern to the corporate brand should there be a data

Published on: June 17th, 2014 Howard Solomon