The general public deserves less hyperbole and more straight talkBy Michael McMahon Director, Cyber Strategy & Analysis, Innovative Analytics & Training, LLC, 5/22/20150 comments | Read | Post a Comment
Apple is preparing some long overdue features for the iPad and may launch them on larger iPad Pro tablets later this year. This relates back to functionality in the upcoming iOS 9.By Eric Zeman , 5/22/20150 comments | Read | Post a Comment
Disneyland begins the celebration of its 60th anniversary today and the new movie Tomorrowland also debuts. We celebrate 60 years of the future.By David Wagner Executive Editor, Community & IT Life, 5/22/20150 comments | Read | Post a Comment
Working group of federal agencies and private industry launched by the state of Virginia is studying car vulnerabilities and building tools to detect and protect against vehicle hacking and tampering. By Kelly Jackson Higgins Executive Editor at Dark Reading, 5/22/20150 comments | Read | Post a Comment
Humans were responsible for only 41% of network traffic monitored by Distil Networks; bots made up the rest. What does this mean for your applications?By Curtis Franklin Jr. Executive Editor, Technical Content, 5/22/20150 comments | Read | Post a Comment
As it prepares for independence from eBay, PayPal is trying to redefine itself as something more than a payment company.By Thomas Claburn Editor at Large, Enterprise Mobility, 5/21/20150 comments | Read | Post a Comment
NASA's Technology Roadmap for 2015-2035 gives hints about the future of IT in your enterprise. Here's how space is changing big data, supercomputing, and other technologies.By David Wagner Executive Editor, Community & IT Life, 5/21/20154 comments | Read | Post a Comment
The NSA and its Five Eyes allies researched a man-in-the-middle attack to infect Android smartphone users by hacking Google's App Store. It's the last revelation from Edward Snowden. By Eric Zeman , 5/21/20158 comments | Read | Post a Comment
Apple could be showing "Home," an app that integrates with home automation framework HomeKit and iOS 9, at WWDC next month. By Kelly Sheridan Associate Editor, InformationWeek, 5/21/20151 Comment | Read | Post a Comment
While Google's mapping technology can make everyday life much easier for many -- especially during Memorial Day weekend -- users' ability to edit search terms with Map Maker can cause problems.By Nathan Eddy Freelance Writer, 5/21/20155 comments | Read | Post a Comment
Conventional encryption is a surefire solution for protecting sensitive data -- except when it breaks cloud applications. “Format-preserving” encryption could change all that.By Thomas Ristenpart Asst. Professor, Computer Sciences, University of Wisconsin, 5/21/20150 comments | Read | Post a Comment
A new hosted service from Fluke Networks uses physical and virtual appliances to monitor cloud application performance.By Andrew Conry Murray Director of Content & Community, Interop, 5/21/20150 comments | Read | Post a Comment
Learn what traits to look for in data-savvy movers and shakers, from data scientists and business analysts to executives, managers, and even employees.By Lisa Morgan Freelance Writer, 5/21/20152 comments | Read | Post a Comment
Finding vulnerabilities in custom web applications isn't the major problem; fixing them in a timely fashion is, a new report from WhiteHat Security finds.By Sara Peters Senior Editor at Dark Reading, 5/21/20150 comments | Read | Post a Comment
The American Registry for Internet Numbers says it will have to activate its IPv4 waiting list this summer. Enterprises can opt for IPv4 transfer market or finally consider deploying IPv6.By Marcia Savage Managing Editor, Network Computing, 5/21/20153 comments | Read | Post a Comment
Looking to enrich your brain this summer? Look no further than these free online courses on everything from cyberwarfare and Python programming to superheroes, robotics and cooking for geeks.By Susan Fogarty Editor in Chief, 5/21/20155 comments | Read | Post a Comment
Microsoft has given Windows 10 for desktop its share of attention. What can we expect from Windows 10 Mobile?By Kelly Sheridan Associate Editor, InformationWeek, 5/20/20154 comments | Read | Post a Comment
Building a Mobile Business MindsetThe differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but that’s arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which they’re developed — even the attitudes, values, and work styles of the developers creating them.
Dark Reading Threat Intelligence Survey Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.
. We've got a management crisis right now, and we've also got an engagement crisis. Could the two be linked? Tune in for the next installment of IT Life Radio, Wednesday May 20th at 3PM ET to find out.