Desktop virtualization users say the technology brings challenges |
- Desktop virtualization users say the technology brings challenges
- Agency to deliver shared governance, risk compliance service
- Hackers break into Linux source code site
- Three Steps to Combatting Rogue IT
- What CIOs Should Do About Rogue IT
- Tips for Taming Rogue IT
- Mac OS X can't properly revoke dodgy digital certificates
- Hackers may have stolen over 200 SSL certificates
- VMware strives to expand security partner ecosystem
Desktop virtualization users say the technology brings challenges Posted: 01 Sep 2011 09:38 AM PDT |
Agency to deliver shared governance, risk compliance service Posted: 31 Aug 2011 04:34 AM PDT |
Hackers break into Linux source code site Posted: 31 Aug 2011 03:58 AM PDT |
Three Steps to Combatting Rogue IT Posted: 31 Aug 2011 03:20 AM PDT |
What CIOs Should Do About Rogue IT Posted: 31 Aug 2011 03:13 AM PDT The CEO has fallen head over heels for his iPad. The marketing team has set up shop on every social media site known to man. The sales group has secretly purchased its own software-as-a-service subscriptions. Meanwhile, the VP of operations is wondering whether there isn't something better out in the cloud that the company could use to run its supply chain. |
Posted: 31 Aug 2011 03:02 AM PDT |
Mac OS X can't properly revoke dodgy digital certificates Posted: 31 Aug 2011 02:38 AM PDT |
Hackers may have stolen over 200 SSL certificates Posted: 31 Aug 2011 12:25 AM PDT |
VMware strives to expand security partner ecosystem Posted: 30 Aug 2011 11:59 PM PDT |
You are subscribed to email updates from "Cisco" via Ehsan in Google Reader To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment