Measures come amid news that up to 12 banks may have fallen victim to attacks attempting to steal millions via the SWIFT network.By Jai Vijayan Freelance writer, 5/27/20160 comments | Read | Post a Comment
Rather than build a brand new device to compete with the Amazon Echo, Apple is working to improve the capabilities of its Apple TV product, according to a new report. By Eric Zeman , 5/27/20160 comments | Read | Post a Comment
Intel, which recently announced that it would focus more on the Internet of Things and cloud computing, is acquiring Itseez, which specializes in IoT and self-driving vehicle technology.By Nathan Eddy Freelance Writer, 5/27/20160 comments | Read | Post a Comment
In the first of a two-part series, we examine the impact DDoS attacks have on business continuity Ė and why it is so much more than a network security problem. By Vincent Berk CEO, FlowTraq, 5/27/20160 comments | Read | Post a Comment
Hewlett Packard Enterprise's plan to spin off its IT Outsourcing and services group and merge that group with CSC will make the remaining HPE a leaner, more focused company. It's a strategy other tech giants have pursued as well. But what about the downsides?By Jessica Davis Senior Editor, Enterprise Apps, 5/27/20160 comments | Read | Post a Comment
Hottest crimes reported to IC3 last year include ransomware and email scams via business email compromise and all account compromise attacks. By Ericka Chickowski Contributing Writer, Dark Reading, 5/27/20160 comments | Read | Post a Comment
Microsoft and Facebook are joining forces to construct the "MAREA" undersea cable, which will deliver high-speed connectivity across the Atlantic.By Kelly Sheridan Associate Editor, InformationWeek, 5/27/20160 comments | Read | Post a Comment
Reversing a reversal of its initial victory, Google once again has prevailed against Oracle's claim that Android infringes its Java copyrights.By Thomas Claburn Editor at Large, Enterprise Mobility, 5/27/20161 Comment | Read | Post a Comment
CIOs are expected to be experts in tech as well as business while leading diverse and complicated intiatives and teams. But they don't have to go it alone. Here are 11 books to help CIOs -- and aspiring CIOs -- get better at many of the critical facets of their complex jobs. By Curtis Franklin Jr. Executive Editor, Technical Content, 5/27/20161 Comment | Read | Post a Comment
The partnership with Amazon Web Services is expected to give Salesforce the ability to offer its core services as part of its international infrastructure expansion for the first time.By Dawn Kawamoto Freelance Writer and Editor, 5/26/20160 comments | Read | Post a Comment
Employee satisfaction and hundreds of billions in revenue when CISOs don't look for creative ways to secure innovative change.
By Ericka Chickowski Contributing Writer, Dark Reading, 5/26/20161 Comment | Read | Post a Comment
PayPal will end support for its popular online payment app at the end of June, dealing another blow to BlackBerry and Windows Phone. The update also eliminates support for Amazon.By Nathan Eddy Freelance Writer, 5/26/20161 Comment | Read | Post a Comment
All the world may be a stage, but in the theater of cybersecurity, we need a more relevant dialogue of fresh ideas, novel approaches, and new ways of thinking.
By Joshua Goldfarb VP & CTO - Emerging Technologies, FireEye, 5/26/20160 comments | Read | Post a Comment
The FedRAMP standard for federal agency use of cloud services has too many complications in its operations and lacks the assurance of security, according to the results of a MeriTalk survey.By Charles Babcock Editor at Large, Cloud, 5/26/20161 Comment | Read | Post a Comment
French investigators are seeking information about whether Google has been evading its tax obligations.By Thomas Claburn Editor at Large, Enterprise Mobility, 5/26/20161 Comment | Read | Post a Comment
As companies begin to fully embrace the digital workplace, they should focus on the employee experience the same way they would on the customer experience.By Carol Zichi Global Offering Manager for Enterprise Mobility Management, IBM, 5/26/20160 comments | Read | Post a Comment
A report by the Government Accountability Office finds a number of government agencies are spending billions of dollars each year to run their departments using antiquated tech, including 8-inch floppy disks and Windows Server 2003.By Dawn Kawamoto Freelance Writer and Editor, 5/26/20160 comments | Read | Post a Comment
Building a Mobile Business MindsetThe differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but thatís arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which theyíre developed ó even the attitudes, values, and work styles of the developers creating them.
Dark Reading Threat Intelligence Survey Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.