Thwart DNS Hijackers: 5 Tips
Domain name system attacks hit The New York Times and Twitter hard last month. Here are five ways to make your DNS records harder to hack and easier to recover if they're compromised.
Secure Data, Not Devices
As government goes mobile and makes greater use of cloud services, IT leaders must adopt a more data-centric, not device-centric, security approach.
Cloud Adoption: 4 Human Costs
Moving to the cloud imposes changes on your IT workforce. Think in terms of changed expectations, education, migration and maintenance.
Ignore Facebook At Your Peril
Facebook continues to make consumer inroads, yet the social networking site makes 'real business' uncomfortable. Time to adjust.
Death By A Million Regulations
It is long past time to assess the consequences of the endless laws, codes, rules, licenses and guidelines governing just about every human activity.
How One SMB Manages Customer Identity Data
Armed Forces Eyewear sells discounted gear to military personnel and their families. Here's why you won't hear customers grumble about their personal data and online privacy.
Light Reading Gets IT
Leading telecom publication has a new community strategy, a new look and a renewed focus on the increasing integration of telecom and IT technologies.
4 Things VMware Must Do At VMworld
VMware CEO Gelsinger needs to show customers a new leadership team and a company that understands how to compete in a multi-hypervisor marketplace.
The Trouble With Smartphone Kill Switches
To fight smartphone theft, public officials tell smartphone makers to add remote-deactivation, tracking and recovery features. But manufacturers may not do the job right.