Search

Filter:

Search Results

Spotlight: Nearly half surveyed say SDN may be too immature to be secure

If you give a group of C-suite executives a list of bad things to choose from and tell them to arrange them in order of bad-to-worse, like a tally of "Brady Bunch" episodes, does the one that rises to the top of the list get counted not only as the worst thing there is, but something worthy ...

These simple security threats may be lurking in your office right now

if a "disgruntled employee" tries to help hackers from inside the network. So how can you handle this? Ponemon ...

News Scan: Emory University goes mobile; Tablets to make enterprise comeback; more

Good Doc | Tablets get thumbs up from IT as work tools] >> Mobile messaging apps aim to bundle ...

Want better BYOD policies? Then, lighten up!

anywhere access to all the tools they need from day one. It is therefore vital for IT to educate end-users, ...

4 tips to get your IT project approved

that will have a tangible, measurable impact on current systems and processes within an acceptable ...

Microsoft identifies human error as root cause behind November Azure outage

Azure had clear operating guidelines but there was a gap in the deployment tooling that relied on human ...

What the IBM-Apple alliance might mean for wearables in the enterprise

Is Apple's iPad the right tool for the enterprise? ...

Reflections of an IT recruiter: Happy times are here again!

development projects? Absolutely. But if I were to step back and look at the numbers, I can tell you ...

Congress defunds ICANN/IANA governance transition

Congress concluded, and members rushed home for the holidays. "None of the funds made available ...

Spotlight: The 'Grinch' that stole Linux

The vulnerability involves a configuration issue with Polkit, which is used to control system-wide privileges ...