Encryption software for On-line drives (Dropbox, Google Drive), Network drives (NAS, shared folders), portable drives. Secured Cloud...
Showing results 1 to 20 of 2,953
Finally some innovation and progress in network security after years of siege mentality - map IT topography, label and write security policy for the modern digital world
The Egg is a webserver; a storage device; a Wi-Fi hotspot; and, maybe, a security service. It makes the "mobile" Internet a reality: it fits in your pocket and runs all day on batteries.
Malaysia Airlines' website has been attacked by the Lizard Squad, with the hackers claiming to have compromised user data in the security breach.
A Chinese official has said that Apple CEO Tim Cook agreed to have Apple products inspected by Chinese network experts to ensure information safety and national security.
Potential security vulnerabilities found in the NSW roads management network could lead to accidents and vehicle congestion, according to a new report by the NSW auditor-general.
The social media network hopes ZipDial's 'missed call' technology will bring Twitter to those in emerging markets where Wi-Fi connections can be unstable.
On the back of its Ooyala acquisition, Telstra has continued its push to become a global technology company with the launch of a new video distribution network known as Global Media Switch.
Distributed Denial of Service (DDoS) and routing attacks on online infrastructure increased last year according to a European agency for network security.
Although Docker container technology has rocketed in popularity, new research from Gartner suggests its rapid rise hasn't necessarily outstripped its security features.
Today's smartphones and tablets offer computing power, memory and storage that surpass that offered by mainframe computers in the 1990s. But security remains an ongoing challenge.
Flash arrays are gaining momentum in the data center and technology buyers need to ponder a storage system swap when older gear is retired.
Storage technology develops in two dimensions: how it works and how it's used. 2015 will see major movements in both directions, although these will be evolutionary rather than revolutionary.
Apple has issued a security update to address a critical security issue with OS X's Network Time Protocol service.
A network time protocol security hole has been discovered and there are reports that exploits already exist for it and are being used in attacks.
Nearly a quarter of Australian organisations have suffered an interruption to their business due to an IT security attack or breach over the past 12 months, according to new research by Telstra.
As well as acquiring storage-engine company WiredTiger, open-source database firm MongoDB is bringing on board the architects behind the technology.
Vinyl storage - in the form of LP records - is staging a comeback. Over 8 million LPs - more than 5 petabytes in digital capacity - were produced last year, up 49 percent. But the old technology has problems.
Telstra will hand over ownership of its copper and hybrid fibre-coaxial networks to NBN Co for the multi-technology mix network under a new deal signed on Sunday.
Sony's security failure has been devastating, but the company is turning to technology in an attempt to halt downloads of its confidential data.
Communications Minister Malcolm Turnbull has said that NBN Co will soon release an audited historical cost per premises passed for the fibre-to-the-home network to show the actual cost of the network rollout up until the multi-technology mix switch.
The best of ZDNet, delivered
- 1 Windows 10: You've got questions, I've got answers
- 2 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 3 Hands-on with Windows 10: Installing the latest Technical Preview
- 4 31 ways to improve your iPhone's battery life
- 5 How much does an iPhone 6 really cost? (Hint: It's way more than $199)