REPORTS
FILTER REPORTS BY: Back to Reports
HIGHLIGHTED REPORT(S)
How Attackers Target and Exploit Social Networking Users

How Attackers Target and Exploit Social Networking Users

As social networking becomes increasingly embedded into business processes, security professionals are challenged to balance flexibility and security. Dark Reading examines the growing role of social in the enterprise and the new vulnerabilities it is opening up, breaks down the types of ­attacks being waged via social media sites, and recommends strategies for keeping end users and corporate data alike safe.

IT's Stake in Vendor Turf Wars

IT's Stake in Vendor Turf Wars

The enterprise tech market used to be an orderly place. No more. Now big vendors like Cisco, HP, IBM and Oracle are duking it out for primacy -- and refusing to work together for IT's benefit. Must we now pick a side, or is neutrality an option?

Research: InformationWeek Cloud Storage Survey

Research: InformationWeek Cloud Storage Survey

The prospect of employees carrying around two or three computers, each with tens of gigabytes of storage, sounds like a worst-case scenario for backup administrators. But fear not: Persistent connectivity, online services and apps that intelligently sync data turn mobile backup into something between an easily solved problem and a completely unnecessary step.