Encrypted systems now being added to botnets in the latest incarnations of ransomware attacks, with experts expecting this to become standard practice.By Ericka Chickowski Contributing Writer, Dark Reading, 5/24/20160 comments | Read | Post a Comment
The company's IRIS system promises dramatic speed improvements over existing technologies. These storage improvements should benefit anyone running large database queries, particularly transactions that require speed.By Thomas Claburn Editor at Large, Enterprise Mobility, 5/24/20160 comments | Read | Post a Comment
Microsoft is partnering with 12 business around the world to broaden access to Internet and cloud-based services.By Kelly Sheridan Associate Editor, InformationWeek, 5/24/20160 comments | Read | Post a Comment
Five lessons learned the hard way by the Tampa International Airport about bringing third parties into a security environment. By Joe Schorr Director of Advanced Security Solutions, Bomgar, 5/24/20160 comments | Read | Post a Comment
Cloud-based data-backup solutions can help companies continue to generate revenue under unexpected or disastrous circumstances.By Michael Puldy Director of Global Business Continuity Management for Global Technology Services, IBM, 5/24/20160 comments | Read | Post a Comment
Calling 2016 "the year mobile has happened," Google's SVP of ads and commerce Sridhar Ramaswamy announced improvements to advertising functionality for tablets and smartphones. More text, better bidding, responsive formats, and expanded location-based capabilities are all coming Google's mobile ad business.By Thomas Claburn Editor at Large, Enterprise Mobility, 5/24/20161 Comment | Read | Post a Comment
A look at the perils of manual user-access provisioning and ways to streamline and better manage the process via automation.By Sean Martin CISSP | President, imsmartin, 5/24/20160 comments | Read | Post a Comment
The MacBook Pro refresh may be coming later than expected, but Apple could include major new features like an OLED touch bar display.By Nathan Eddy Freelance Writer, 5/24/20160 comments | Read | Post a Comment
Rancher Labs is gaining traction since launching version 1.0 of its container management system and pulling in $20 million in venture capital funding.By Charles Babcock Editor at Large, Cloud, 5/24/20160 comments | Read | Post a Comment
Market research firm IDC forecasts a 50% increase in revenues from the sale of big data and business analytics software, hardware, and services between 2015 and 2019. Services will account for the biggest chunk of revenue, with banking and manufacturing-led industries poised to spend the most.By Jessica Davis Senior Editor, Enterprise Apps, 5/24/20160 comments | Read | Post a Comment
Apple watchers can add "OLED display" to the list of features we're expecting in the iPhone 7, as hinted by the CEO of Applied Materials.By Kelly Sheridan Associate Editor, InformationWeek, 5/24/20161 Comment | Read | Post a Comment
Graduation time at colleges and universities across the nation yields a fresh crop of potential IT pros. But competition is fierce for top tech talent. Here are 10 tips from a recruiting expert on how to identify rising stars and seal the deal when hiring the best in class among recent grads.By Dawn Kawamoto Freelance Writer and Editor, 5/24/20160 comments | Read | Post a Comment
Microsoft has unveiled a two-pronged approach to fighting back against terrorists' efforts to use the Internet and social media to communicate with one another and recruit new members.By Dawn Kawamoto Freelance Writer and Editor, 5/23/20161 Comment | Read | Post a Comment
Building a Mobile Business MindsetThe differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but thatís arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which theyíre developed ó even the attitudes, values, and work styles of the developers creating them.
Dark Reading Threat Intelligence Survey Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.