Insiders are responsible for as much as 80 percent of malicious attacks. Because insiders are trusted by nature, detecting their illicit activities requires an array of monitoring, scanning, and other techniques. Roger Grimes, an InfoWorld contributing editor -- and a working security professional who tracks down unscrupulous insiders -- explains how to plan and execute a complete insider threat strategy.
Thanks to the success of Amazon EC2, Salesforce, and other public cloud services, most enterprises understand the value of cloud computing, and an increasing number of enterprises are exploring the idea of getting into the cloud computing business. Why not? Launching a public cloud service may establish a new revenue stream -- or self-service convenience for customers -- with minimal additions to existing infrastructure.
Change never lets up in technology, and the best developers must stay atop all the latest shifts, from big data to cloud computing to consumerization and beyond. InfoWorld's experts offer guidance to programmers on trends to watch, best practices to adopt, and sins to drop. They also point out programming languages on the rise, the best areas to find tech jobs, and the business skills to master.
These days, successful technology leadership means creatively and innovatively using technology to make a real business impact, whether in the private, government, education, or nonprofit sector. To honor the leaders behind such innovation, InfoWorld.com, the premier website for IT and business professionals seeking to stay abreast of leading technology trends and issues, seeks entries for its annual Technology Leadership Awards.
There may be someone in a dark corner of IT who hasn't heard about the consumerization of IT, that growing trend toward active user involvement and even control over aspects of the business's technology portfolio. By now, most of IT is aware -- sometimes painfully so. Also quite aware are business execs, who increasingly wave away IT's securty and control concerns as their users and customers swoon over iPads, social networking, cloud services, and the rest of the consumerization repertoire. They see employees who can do more in more places, and often they're discovering the joys personally.
InfoWorld gives you the full scoop on the state of the cloud in 2012, including key trends in the cloud's technology and its job opportunities, as well as what you have to know about the cloud before developing for it.
If malware were biological, the world would be in the grip of the worst pandemic in history. In 2009, more than 25 million unique malware programs were identified, more than all the malware programs ever created in all previous years. No one need wonder what all that malware is trying to do: It's trying to steal money -- through data theft, bank transfers, stolen passwords, or swiped identities.
Copyright 2013 IDG Communications. ABN 14 001 592 650. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of IDG Communications is prohibited.