RSA Breach claims its first major victim in Lockheed Martin

After the RSA breach, there was a fair amount of debate over how much security fallout there would be, if any. As
The Macs ARE coming, and there might not be a lot you should do to stop them

When I first started out as a beat reporter covering mobile for SearchMobileComputing, it was an interesting time: The iPhone was relatively new, BlackBerry was the only true "corporate" phone, there were serious questions between whether...
Networking Wrap-Up
Big Brother gets better vision after Seattle’s 802.11n upgrade

Are you ready for World IPv6 Day?
Since IPv4 addresses have slowly but surely begun to run out, the Internet Society has arranged a day to test out the future, or IPv6 at least: June 8, 2011. With the air of someone foretelling the apocalypse, IPv6 advocates strongly...
Debunking the Myth of a “Good Enough” Network (sponsored)
Some vendors and analysts content that the network just connects boxes and all you need is a tactical network, capable of addressing current business requirements and challenges. Cisco wants to debunk the myth that "good" is good enough for your business. Read this
Read This: Networking Blogs
As networking month continues, we continue to bring you guides on the best places to get information and insight from networking professionals. Thank you to everyone who recommended a blog to us (in...
Lessons from the Sony breach: Three ways to avoid a repeat
Follow Me: Networking Twitter Pros
We're making some headway in Networking Month with regular updates and ground coverage from Michael Morisy at Interop 2011. But you don't need to travel to Vegas to get the latest in networking...
Following the road from virtualization to private cloud bliss

Looking for the heart to proceed with your stumbling virtualization plans? The brains to figure out how to deal with...