10 steps to cut data risk in a merger

10 steps to cut data risk in a merger

Merger and acquisition activity stands to increase as global markets struggle to stay afloat during the worst economic slowdown in...

February 23rd, 2009 Craig S. Mullins

The legalities of cloud privacy

The legalities of cloud privacy

Enterprises are increasingly interested in cloud computing as a potential solution to capacity challenges. The idea is that if you...

September 23rd, 2008 Andreas Antonopoulos

HP logo

HP spits out five new printers

HP announced Tuesday five new printers aimed at the enterprise market. The hardware vendor partnered up with several companies for...

August 11th, 2008 Briony Smith

B.C. reseller to distribute LookingGlass data storage and recovery

B.C. reseller to distribute LookingGlass data storage and recovery

Bellevue, Wash.-based data storage and access technology vendor will expand into the Canadian market through Victoria, B.C.-based reseller International Technology...

July 8th, 2008 Kathleen Lau

WildPackets intros 10G Ethernet data recorder

WildPackets intros 10G Ethernet data recorder

WildPackets has introduced a highly extensible data recorder for 10 Gigabit (10Gig) Ethernet networks, the latest sign that 10Gig networks...

June 29th, 2008 Matthew Broersma

Canadian traders get new e-mail archive rules

Canadian traders get new e-mail archive rules

New Canadian e-mail storage and retrieval requirements legislation is coming down the pipe, with companies moving to streamline their e-mail...

June 18th, 2008 Briony Smith

Four tips for making a document retention policy

Four tips for making a document retention policy

The 2002 Sarbanes-Oxley regulations served as a wake-up call for CIOs to formalize document retention policies to meet compliance requirements....

May 27th, 2008 Carrie Mathews

Symantec mouthpiece issues pro-IT compliance report

Symantec mouthpiece issues pro-IT compliance report

The Symantec-sponsored IT Policy Compliance Group announced today the availability of “IT Governance, Risk, and Compliance—Improving Business Results and Mitigating...

May 14th, 2008 Briony Smith

The knock on NAC

The knock on NAC

Three years ago, network access control was the big buzzword in security. NAC’s goal was to ensure PCs and other...

March 4th, 2008 Howard Solomon