Although Docker container technology has rocketed in popularity, new research from Gartner suggests its rapid rise hasn't necessarily outstripped its security features.
Showing results 1 to 20 of 994
Nearly a quarter of Australian organisations have suffered an interruption to their business due to an IT security attack or breach over the past 12 months, according to new research by Telstra.
Sony's security failure has been devastating, but the company is turning to technology in an attempt to halt downloads of its confidential data.
After cyberattack resulted in internal networks being shuttered and confidential files leaked across the web, Sony has pulled in the professionals.
BitSight found that although the retail industry is still very much a hack target, 75 percent of retailers hit with a breach managed to improve their security effectiveness.
A collection of notable security news items for the week ending November 7, 2014. Covers enterprise, controversies, reports and more.
Sponsored by Redhat and Intel
The Internet of Things is set to revolutionise the way business is conducted. Recognising security concerns and infrastructure requirements needed to support IoT integration now will ensure that your enterprise IT architecture is ready to benefit from this technology in the future.
Security concerns of midsize businesses are preventing them from taking full advantage of cloud, mobility, and big data.
Finance, security and healthcare are set to be the main sectors to use new graph analytics technology from software firm Actian.
Cost benefits make it tough for enterprises not to adopt cloud services in spite of the security risks, so they should embrace it by putting in place the necessary processes, say panelists at a discussion moderated by ZDNet blogger Eileen Yu.
It looks like the infiltrators had a look around in JPMorgan's June security breach -- but did not manage to siphon customer funds from bank accounts.
Many Australian small and medium enterprises are deliberately choosing to be late adopters of digital communications technology, despite being acutely aware of its benefits, according to a new study by the Australian Communications and Media Authority.
A draft document released by the Australian Department of Finance outlines requirements for government IT contractors to notify customers within 12 hours once they become aware of actual or suspected security incidents.
The tech giant's stock price has plummeted over the past 24 hours, sending Apple shares to a low not experienced since January.
USIS, which performs background checks for the Department of Homeland Security, revealed that it was hacked earlier this month. The same company vetted Edward Snowden for the government.
A major contractor of the US Dept. of Homeland Security suffers a major breach, months after it was accused of faking hundreds of thousands of background checks.
Target's security breach almost pales in comparison to what might be the largest swath of stolen Internet credentials ever.
If you dined at one of these specific restaurants, your credit card details may have been stolen.
Sponsored by Redhat
More public agencies around the world are paying attention to the benefits open source technology can bring to their citizens. Just how does open source help?
3D printing may hold both promise and peril, according to industry experts. Our latest guide looks at how this evolving technology is being used, the benefits it offers, and the concerns it raises.