Blogroll
5 signs you're outgrowing MySQL
MySQL has long been the go-to database of the Web. It has powered some of the largest websites on the planet, as well as countless installations of open source software on every scale imaginable. But as many have learned, at a certain point, MySQL can become a burden to scale efficiently.
Scott Sullivan, vice president of technical account management at NewSQL vendor Clustrix, explains MySQL's limitations and details how NewSQL databases provide a fresh alternative. -- Paul Venezia
3 reasons why IT execs need to go out to lunch more
In the last couple of years, social, mobile, analytics and cloud technologies have risen to the top of many organizations' agendas. IDC calls the combination of these technologies "the third platform" and predicts they will account for 89% of technology spending this year.
Unofficial XP update has Microsoft up in arms
Windows XP users are discovering that their now-unsupported operating system can receive updates from Microsoft by making a few simple changes to the Registry -- albeit updates intended for different versions of Windows.
Unofficial XP update has Microsoft up in arms
Windows XP users are discovering that their now-unsupported operating system can receive updates from Microsoft by making a few simple changes to the Registry -- albeit updates intended for different versions of Windows.
A Model for Licensing IT Security
Category: Legal Issues
Paper Added: August 6, 2013
Discovering Security Events of Interest Using Splunk
Category: Logging Technology and Techniques
Paper Added: July 17, 2013
Practical Cyber Security Training Techniques for New IT Support Employees
Category: Best Practices
Paper Added: July 19, 2013
Detecting Security Incidents Using Windows Workstation Event Logs
Category: Logging Technology and Techniques
Paper Added: July 9, 2013
Security Best Practices for IT Project Managers
Category: Best Practices
Paper Added: June 24, 2013
A Practical Social Media Incident Runbook
Category: Incident Handling
Paper Added: June 20, 2013
Web Application Injection Vulnerabilities: A Web App's Security Nemesis?
Categories: Application and Database Security,Securing Code,Security Basics
Paper Added: June 14, 2013
Electronic Medical Records: Success Requires an Information Security Culture
Categories: HIPAA,Compliance
Paper Added: June 5, 2013
Corporate vs. Product Security
Categories: Best Practices,Incident Handling,Security Policy Issues,Management & Leadership
Paper Added: June 3, 2013
Securing BYOD With Network Access Control, a Case Study
Category: Network Access Control
Paper Added: May 23, 2013
Event Monitoring and Incident Response
Categories: Incident Handling,Intrusion Detection
Paper Added: May 15, 2013
Dead Linux Machines Do Tell Tales
Category: GIAC Honors Papers
Paper Added: May 15, 2013
Setting Up a Database Security Logging and Monitoring Program
Category: Application and Database Security
Paper Added: May 10, 2013
Managing the Implementation of a BYOD Policy
Category: Management & Leadership
Paper Added: May 8, 2013
Analysis of the building blocks and attack vectors associated with the Unified Extensible Firmware Interface (UEFI)
Category: Managed Services
Paper Added: May 2, 2013