REPORTS
FILTER REPORTS BY: Back to Reports
HIGHLIGHTED REPORT(S)
Strategy: Identifying and Discouraging Determined Hackers

Strategy: Identifying and Discouraging Determined Hackers

You've done all the right things to defend your organization against ­cybercrime. Is it time to go on the offensive? Active response must be ­carefully thought through and even more carefully conducted. This Dark Reading report examines the rising interest in active response and recommends ways to determine whether it's right for your organization.

Government Innovators

Government Innovators

With projects ranging from safer Web browsing to a 21st century air traffic control system, federal, state, and local agencies demonstrate that they, too, can apply IT in critical and novel ways
State of the Database

State of the Database

We surveyed 755 business IT pros on their satisfaction with their databases' performance, features, security and costs. One thing is clear: Change is coming to this foundational technology. Here's how to keep your footing.

Research: VDI Adoption 2010

Research: VDI Adoption 2010

Is virtual desktop infrastructure technology a passing trend or a long-term solution to the problem of unmanageable and unsecurable desktops? It's a complex question, and the answer depends on both our ability to identify the benefits and limitations of VDI and application vendors' willingness to work with us. In this report, we'll analyze the present state of VDI technology, highlighting both its benefits and those aspects needing improvement.