Industrial SCADA, ICS and manufacturing systems once ran on proprietary networks, used proprietary equipment, and were isolated from business networks and the internet....  more>>
Tuesday, January 28, 2014
Today many are touting their abilities with High Performance Computing (HPC). HPC is seemingly found everywhere – Big Pharma, Wall Street Trading, Government Labs, Social Media, Big Data Search Engines, Oil and Gas, Automotive, Aeronautics and other fields. But is HPC really HPC or is it - just perhaps - Brute Force Computing?...  more>>
Thursday, March 5, 2015
At ISE, we use cloud computing as an innovation platform to support our research and development efforts and explore opportunities before bringing them to market. Given the latency requirements around operating a financial marketplace, the cloud is not a feasible alternative for our core production trading systems at this time, but it is an important aspect in our non-trading operations. ...  more>>
Friday, April 3, 2015
Every week, whether it makes the news or not, companies suffer the consequences of an incomplete data security strategy....  more>>
Wednesday, June 10, 2015
IT Leaders are consistently reminded about the need for improved security of their IT assets. However, in most organizations security concerns take a backseat to high-visibility efficiency gain projects. When security does gain an organization’s attention...  more>>
Friday, November 27, 2015
Deploying applications in a public cloud environment can be an extremely liberating experience for applications teams....  more>>
Thursday, March 3, 2016
Many security practitioners have traditionally struggled with how to get key stakeholders to take security seriously. In recent years, security discussions have come to the forefront and more likely than not....  more>>
Friday, August 5, 2016
As the moderator of a roundtable discussion with some of the brightest CIOs in the tech world, I like to dive deep and get to the root of the various technology and management issues they are confronting....  more>>
Tuesday, August 9, 2016
At CSC [CL2], our various business units each have a chief information officer (CIO), and as the chief information security officer (CISO), I work hand-in-hand with those CIOs to continually increase information security for employees and customers. ...  more>>
Wednesday, August 17, 2016
Have you ever noticed that it’s easier to spot changes when you only see some­one or something occa­sionally compared to when you see that same thing every day?...  more>>
Monday, September 26, 2016
<<Previous  1   Next>>