Brian Taylor, TechRepublic

Brian Taylor

TechRepublic

Chicago, IL, United States

Contact Brian

Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.

Start free trial

Recent:
  • Unknown
Past:
  • TechRepublic

Past articles by Brian:

Endpoint security: People are the biggest source of vulnerability

People are trusting when they use personal devices for work, says Ziften's Mike Hamilton. The key is to enable the people securing your company with an agile solution that protects everyone. → Read More

Better data protection means better visibility into storage

Storage security used to be about hardware, says DataGravity's Paula Long, but the data is what is most at risk. Firms need more visibility into their data to better protect it. → Read More

Top 10 priorities for a successful Hadoop implementation

Hadoop adoption is up, and TDWI says it will be a common enterprise tool within five years. These best practices help organizations get the most out of Hadoop. → Read More

Top 10 priorities for a successful Hadoop implementation

Hadoop adoption is up, and TDWI says it will be a common enterprise tool within five years. These best practices help organizations get the most out of Hadoop. → Read More

Security report: Industry and online presence drive your cyberthreat profile

The Alert Logic 2015 Cloud Security Report found that there is a wide divergence of threats by industry, hackers view cloud targets as easier prey, and more. → Read More

2nd generation Hadoop: A platform for your most critical cloud applications

As Hadoop adoption progresses, enterprises have to view it as a platform for real-time, vitally important cloud solutions, says WANdisco's David Richards. → Read More

The #1 mistake you make when measuring user engagement

In order to accurately measure real-time user engagement, find out which analytics you need to review and which metrics can be misleading. → Read More

'Going virtual' may double your security costs

Breaches of virtualized environments can cost enterprises twice as much. Kaspersky says know the risks and choose your security approach carefully. → Read More

Address hybrid cloud management from the get-go to sidestep costly IT silo mistakes

HotLink CEO Lynn LeBlanc offers advice on managing hybrid IT, transforming your data center, and getting started in tech entrepreneurship. → Read More

The secret ingredients for making Hadoop an enterprise tool

A Gartner survey on Hadoop is encouraging, says Andrew Brust, given that it's not fully in the hands of enterprise users. Here's what he thinks can change that. → Read More

Stop wasting your IT budget on the wrong security threats

A Black Hat survey shows that security pros' biggest concerns -- targeted attacks, phishing, and accidental leaks -- don't have similar emphasis in IT budgets and tasks. → Read More

4 vital elements in a robust healthcare IT security strategy

Malware, HIPAA violations, and privacy breaches top healthcare execs' list of IT security risks, according to KPMG. Here's what to include in an effective IT security strategy. → Read More

4 reasons cybersecurity now requires an analytics-driven strategy

It's time to rethink your IT security strategy. ESG points out the benefits of the new analytics-driven cybersecurity approach. → Read More

Shifting to DevOps? Put your ducks in a row first

With DevOps implementations, you need to figure out why and how and then streamline. A DevOps expert weighs in on barriers to adoption, software delivery trends, and more. → Read More

Datto's 6 seconds restore capability keeps SMBs online during a disaster

Whether SMBs are faced with a disaster, complete data loss, ransomware, or a virus, Datto's backup products can keep them up and running, says CEO Austin McChord. → Read More

Report: Surveillance programs may cost US tech over $35 billion and its competitive edge

In the wake of Snowden's surveillance revelations, the US government has to balance security interests with risks to damaging US tech leadership worldwide, concludes the authors of an ITIF report. → Read More

Key to HIPAA compliance is understanding your data center and cloud risks

Hosting protected healthcare data in the cloud, says Connectria's David Pollard, means you have to find a solid partner and know your on-premise and cloud risks. → Read More

Shadow data report underscores the need for strong cloud app security

Enterprises like the ease and efficiency of using cloud apps. A new Elastica report shows that means more file sharing, and a greater risk of exposing sensitive data. → Read More

The number one reason some financial services firms don't adopt cloud

A recent survey's findings point to encouraging signs of cloud confidence among financial services firms. However, some firms are still not adopting cloud. Learn the top reason why. → Read More

Cloud security topics IT leaders must focus on the next 12 months

Customers are moving from cloud-specific solutions to multi-cloud platforms, says CipherCloud VP Dr. Chenxi Wang. They want integrated cloud protection, with visibility and control. → Read More