Securing the Endpoints: The 10 Most Common Internal Security Threats
Who’s gaining access to your internal network? New criminal tactics and new kinds of malware are probing networks for vulnerabilities—and increasingly, finding them. We identify the top candidates for...
View ArticleHow to Spot a Failing Project
Often, the difference between success and failure is spotting critical early warning signs that a project is in trouble. Here are a few ways to identify the symptoms.
View ArticleCan This Project Be Saved?
You've identified that your IT project is in trouble. What are the best ways to save the situation?
View ArticleWorkflow Gone Wrong
If you're planning to implement workflow management software—or to create a solution of your own—you need to learn about the most common mistakes.
View ArticleWorkflow? BPM? I'm So Confused!
What's the difference between workflow and business process management? This introduction explains the distinctions.
View ArticleMaking Workflow Work and Flow for You
Workflow isn't rocket science, but it isn't magic either. While workflow can make major improvements in the way an organization runs, it achieves that goal only when its principles are applied...
View ArticleClosing the Governance Gap With Project Portfolio Management (PPM)
Having problems allocating project resources? PPM measures available resources, such as time and money, against all the proposed projects and applies a consistent methodology to align them with the...
View ArticleTechnology Nightmare: How to Protect Your Network from the Threat of Rogue IT...
An IT admin for the City of San Francisco holding the network hostage is just the latest high-profile example of the security risk posed by insiders. Learn what steps you can take so it won't happen to...
View Article
More Pages to Explore .....