Enrique Iglesias' drone injury raises questions about the rules (and wisdom) of flying such gadgets over large crowds.By David Wagner Executive Editor, Community & IT Life, 6/1/20152 comments | Read | Post a Comment
Australian grocer sent master spreadsheet of customer information and redeemable codes for thousands of gift cards to hundreds of customers.By Ericka Chickowski Contributing Writer, Dark Reading, 6/1/20150 comments | Read | Post a Comment
A rare Apple I computer was saved from the recycling pile by a vigilant worker. Now, the charity is trying to find the woman who donated it, because that person's in for a happy surprise.By David Wagner Executive Editor, Community & IT Life, 6/1/20154 comments | Read | Post a Comment
Google's new account hub, for users of its Web services and Android smartphones, gives IT organizations a new tool to improve employee awareness of security and privacy.
By Thomas Claburn Editor at Large, Enterprise Mobility, 6/1/20150 comments | Read | Post a Comment
Microsoft's next-generation operating system Windows 10 will be available as a free upgrade to Windows 7 and 8.1 users on July 29. But Windows Enterprise version customers will have to wait until later this year. By Kelly Jackson Higgins Executive Editor at Dark Reading, 6/1/20150 comments | Read | Post a Comment
Dive into a page-turner on how Google was built, the power of introverts, or how the Internet is killing our capacity for deep thought. By Kelly Sheridan Associate Editor, InformationWeek, 6/1/20150 comments | Read | Post a Comment
Little known Virtustream, Autonomic Resources, and Carpathia had one thing in common -- FedRAMP certifications. This helped when it came to acquisitions. By Charles Babcock Editor at Large, Cloud, 6/1/20151 Comment | Read | Post a Comment
At its most basic, a consistent and meaningful insider threat detection program has two components: data and people. Here’s how to put them together. By Scott Weber Managing Director, Stroz Friedberg, 6/1/20150 comments | Read | Post a Comment
Asus is making a splash at Computex with the release of three tablets, the latest version of its the Zen Watch 2 smartwatch, all-in-one PCs, and a monitor.By Nathan Eddy Freelance Writer, 6/1/20150 comments | Read | Post a Comment
A new Digital Operating Center uses micro-tests to help organizations understand their Web application performance.By Curtis Franklin Jr. Executive Editor, Technical Content, 6/1/20151 Comment | Read | Post a Comment
Gencore Systems took advantage of Juniper Networks' OpenLab facility to test and bring to market new cloud analysis software that relies on SDN.By Susan Fogarty Editor in Chief, 6/1/20153 comments | Read | Post a Comment
Need a mobile device management solution to secure your network and data against threats from the many devices accessing your systems? Here's a quick guide to the most common features.By InformationWeek Staff , 6/1/20151 Comment | Read | Post a Comment
The HP-Aruba and Fortinet-Meru deals are just the latest moves in an industry always roiling with M&A activity.By Lee Badman Network Engineer & Wireless Technical Lead, 6/1/20153 comments | Read | Post a Comment
Interns at top tech companies such as Facebook and Google enjoy many of the same perks available to full-time employees. By Kelly Sheridan Associate Editor, InformationWeek, 5/31/201522 comments | Read | Post a Comment
Building a Mobile Business MindsetThe differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but that’s arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which they’re developed — even the attitudes, values, and work styles of the developers creating them.
Dark Reading Threat Intelligence Survey Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.