Editors' Picks
-
Limiting the effects of cloud computing outages
After making the case for cloud based on high availability, IT pros are upset by cloud outages. With planning, there are ways to craft a strategy.16 May 2013
-
Why do I need to manage my VPN client software?
Ensuring that the client software itself is up to date is just one of many reasons why it's critical to oversee VPN clients.03 Apr 2013
-
Microsoft improves Windows 8 DirectAccess as a VPN alternative
Microsoft has made Windows 8 DirectAccess easier for small businesses to deploy, providing IT more control over Windows remote access than with a VPN.27 Mar 2013
-
Cloud computing basics for nonprofits: Raining pennies from heaven?
Technology expert Vanessa James offers cloud computing basics tailored to the nonprofit IT director.11 Feb 2013
-
How to protect users exposed to cache poisoning attacks by HTML5
Expert Nick Lewis explains how the HTML5 offline application cache exposes users to the threat of cache poisoning and provides mitigation options.18 Dec 2012
-
How to avoid security issues with VPN leaks on dual-stack networks
The ongoing transition to IPv6 has revealed security issues with VPN leaks on dual-stack networks. Fernando Gont explains and offers mitigations.17 Dec 2012
-
Network Innovation Award: Aruba ClearPass
With ClearPass, Aruba Networks provides unified access management across wired, wireless and VPNs with centralized policy control for BYOD management.29 Oct 2012
-
What's the best type of VPN for connecting an acquired company?
What happens when your organization acquires a company? How should you connect sites and what type of VPN setup works best? Our expert responds.24 Oct 2012
-
Building a digital workplace, one office at a time
As the digital workplace expands, CIOs must adopt new models for distributing information and gleaning customer insights. Learn more in this podcast.18 Oct 2012
-
Network infrastructure: Good practices
It pays to keep your network infrastructure healthy. Get expert advice on achieving this objective with ease.27 Sep 2012
-
Defend against iPad exploit, rogue access point attacks
An iPad exploit that attacks a rogue access point is dangerous for enterprises and home users. Expert Nick Lewis explains how to defend against it.24 Sep 2012
-
How can incorrectly configuring VPN clients lead to a security breach?
Our virtual private networking expert explains how misconfiguring VPN clients can lead to security breaches in this Ask the Expert response.10 Sep 2012
-
Does a VPN reconnect feature require specific security protocols?
Understanding how a virtual private network (VPN) works with a firewall will allow you to get full connectivity through the correct network ports.25 Jul 2012
-
How can I ensure the corporate VPN works with our firewall?
Understanding how a virtual private network (VPN) works with a firewall will allow you to get full connectivity through the correct network ports.19 Jul 2012
-
Cloud content management not the panacea many seek
In this video, AIIM CIO Laurence Hart explains misconceptions about cloud content management and discusses the importance of taking a holistic view of the possibilities.05 Jul 2012
Network Management Strategies for the CIO