Day: May 20, 2014

Introducing Forrester’s Targeted-Attack Hierarchy Of Needs

We recently published part 1 of a new series designed to help organizations build resiliency against targeted attacks. In the spirit of Maslow, we designed our Targeted-Attack Hierarchy Of Needs. One factor that significantly drove the tone and direction of this research was Forrester client inquiries and consulting. Many organizations were looking for a malware sandbox to check…

How to Interpret CPU Load on Linux

Monitoring, anticipating, and reacting to server load is a full time job in some organizations. Unexpected spikes in resource usage can indicate a software or hardware problem. Gradual increases over time can help you predict hardware growth requirements. Under utilization can show you opportunities to use hardware more efficiently. CPU load is one of the…

Seven Changes Driving the Future of IT

A recent global survey commissioned by CA Technologies and conducted by Vanson Bourne illustrates how radically the role of IT is changing in today’s business — and not always to the benefit of IT leaders and staffers. The survey of 1,300 senior IT leaders from large organizations in 21 countries explored the IT department as…