Think 2014 has been a bad year for security, with high-profile cloud breaches and system hacks? Well, things aren't going to get any better in 2015.
Showing results 1 to 20 of 2,343
Nearly a quarter of Australian organisations have suffered an interruption to their business due to an IT security attack or breach over the past 12 months, according to new research by Telstra.
Close collaboration between development and operations teams can lead to more resilient and secure cloud applications. The challenge is culture, not technology.
As part of its FutureScape prediction series for 2015, IDC looked at the impending IoT space from a broad spectrum of angles, including network capacity, security and cloud.
After cyberattack resulted in internal networks being shuttered and confidential files leaked across the web, Sony has pulled in the professionals.
There are now cloud certifications for all roles -- from developers to administrators to architects to security specialists.
Cloud security platform provider CipherCloud has picked up $50 million in a funding round, which was led by Transamerica Ventures.
BitSight found that although the retail industry is still very much a hack target, 75 percent of retailers hit with a breach managed to improve their security effectiveness.
Microsoft has purchased its fifth non-U.S.-based company this year by buying Israeli cloud security vendor Aorato Ltd.
Security vendors enable extra layers of security for AWS as well as tout new reference architectures for the cloud.
Cycle Computing and Western Digital's HGST unit ran the largest cloud workload by a Fortune 500 company via a 729 TeraFLOPS cluster built on the fly.
CA Technologies has announced several management solutions to provide enterprises with greater overview and control surrounding application deployment.
Sponsored by Sap
Security remains the top concern for enterprises considering a move to cloud services. This issue has been aggravated in our post-Snowden world. While security must be an important priority, it requires a sense of proportion rather than a fear-based approach.
A collection of notable security news items for the week ending November 7, 2014. Covers enterprise, controversies, reports and more.
Its approach isolates applications and their associated data so they can 'float' across multiple locations.
Dubbed as the Dynamic Cloud Security portfolio, 200 IBM engineers have been building the Dynamic Cloud Security portfolio for cloud and on-premise deployments.
Security, cloud and analytics top 2015 wish lists.
Security concerns of midsize businesses are preventing them from taking full advantage of cloud, mobility, and big data.
Sponsored by Redhat and Intel
The recent launch of the Open Platform for NFV initiative by the Linux Foundation presents enormous opportunities for OpenStack cloud operators. Discover what this could mean for your business.
Cost benefits make it tough for enterprises not to adopt cloud services in spite of the security risks, so they should embrace it by putting in place the necessary processes, say panelists at a discussion moderated by ZDNet blogger Eileen Yu.
The best of ZDNet, delivered
- 1 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 2 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 3 31 ways to improve your iPhone's battery life
- 4 Seven privacy settings you should change immediately in iOS 8
- 5 Review: Tile Bluetooth tag (verdict: Great)