Apple's HomeKit will improve Apple's hold on a lot of things, but it won't improve your home in the long run.By David Wagner Executive Editor, Community & IT Life, 6/2/20151 Comment | Read | Post a Comment
Oakland County, Mich., has been providing services to towns for years. Now it's expanding its services through a new government cloud marketplace.By Curtis Franklin Jr. Executive Editor, Technical Content, 6/2/20150 comments | Read | Post a Comment
MongoDB, the popular unstructured document database, will soon work with SQL queries to report on what's in the system. Data encryption also coming.By Charles Babcock Editor at Large, Cloud, 6/2/20151 Comment | Read | Post a Comment
Industry and government leaders discuss ways to improve practices, awareness and education around secure software development. Here’s a recap of what you missed. By Kevin E. Greene Software Assurance Program Manager, Department of Homeland Security Science & Technology Directorate, 6/2/20150 comments | Read | Post a Comment
Cloud sync-and-share services can help businesses reduce on-site equipment, improve backup and compliance, and foster worker collaboration. Find out which platforms are enterprise-worthy.By Network Computing and Interop Author, 6/2/20152 comments | Read | Post a Comment
While not even a drop in the bucket compared to its last breach, Heartland's exposure this week does offer some lessons to the security community.By Ericka Chickowski Contributing Writer, Dark Reading, 6/2/20150 comments | Read | Post a Comment
Applying DevOps to network monitoring can provide network administrators with room to experiment and safely drive NMS improvements.By Patrick Hubbard Head Geek & Senior Technical Product Marketing Manager, SolarWinds, 6/2/20150 comments | Read | Post a Comment
The market analyst firm's Magic Quadrant for all-flash storage arrays is based on criteria that hamstring vendors and reduce customer choice.By Howard Marks Network Computing Blogger, 6/2/20154 comments | Read | Post a Comment
Do CIOs have an inherent conflict of interest when it comes to security? What should be their InfoSec involvement?By Joe Stanganelli Attorney, Beacon Hill Law, 6/2/20151 Comment | Read | Post a Comment
New category of technology promises to aggregate all threat intelligence feeds and help security teams find the attacks that could cause the most damageBy Tim Wilson Editor in Chief, Dark Reading, 6/2/20150 comments | Read | Post a Comment
Enrique Iglesias's drone injury raises questions about the rules (and wisdom) of flying such gadgets over large crowds.By David Wagner Executive Editor, Community & IT Life, 6/1/201511 comments | Read | Post a Comment
Australian grocer sent master spreadsheet of customer information and redeemable codes for thousands of gift cards to hundreds of customers.By Ericka Chickowski Contributing Writer, Dark Reading, 6/1/20150 comments | Read | Post a Comment
A rare Apple I computer was saved from the recycling pile by a vigilant worker. Now, the charity is trying to find the woman who donated it, because that person's in for a happy surprise.By David Wagner Executive Editor, Community & IT Life, 6/1/201510 comments | Read | Post a Comment
Building a Mobile Business MindsetThe differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but that’s arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which they’re developed — even the attitudes, values, and work styles of the developers creating them.
Dark Reading Threat Intelligence Survey Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.