A network time protocol security hole has been discovered and there are reports that exploits already exist for it and are being exploited.
Showing results 1 to 20 of 2,556
Think 2014 has been a bad year for security, with high-profile cloud breaches and system hacks? Well, things aren't going to get any better in 2015.
Nearly a quarter of Australian organisations have suffered an interruption to their business due to an IT security attack or breach over the past 12 months, according to new research by Telstra.
Finzsoft Solutions has signed a five-year agreement with IBM to move its finance and banking applications to the cloud as part of its hybrid cloud infrastructure.
Together with the launch of updated custom Android software PrivatOS, the handset maker has revealed a new store dedicated to security and privacy applications.
Hitachi Data Systems has predicted that in 2015, the market will see enterprises deploy their critical legacy applications into a hybrid cloud infrastructure.
Amazon's latest round of price reductions targets bandwidth costs, knocking down prices significantly for outbound data from its cloud and content delivery network CloudFront.
Close collaboration between development and operations teams can lead to more resilient and secure cloud applications. The challenge is culture, not technology.
As part of its FutureScape prediction series for 2015, IDC looked at the impending IoT space from a broad spectrum of angles, including network capacity, security and cloud.
The idea is to reduce network complexity while boosting IT agility for mutual enterprise customers.
Sponsored by Redhat and Intel
Organizations that want to tap the full capabilities of cloud for the development of enterprise-grade business applications need to equip their IT and development teams with the right tools.
After cyberattack resulted in internal networks being shuttered and confidential files leaked across the web, Sony has pulled in the professionals.
There are now cloud certifications for all roles -- from developers to administrators to architects to security specialists.
The National Security Agency has released a new open-source program for data network interoperability.
Cloud security platform provider CipherCloud has picked up $50 million in a funding round, which was led by Transamerica Ventures.
BitSight found that although the retail industry is still very much a hack target, 75 percent of retailers hit with a breach managed to improve their security effectiveness.
Microsoft has purchased its fifth non-U.S.-based company this year by buying Israeli cloud security vendor Aorato Ltd.
Security vendors enable extra layers of security for AWS as well as tout new reference architectures for the cloud.
The third quarter has been a busy one for the San Antonio-headquartered company. At the beginning of September, Rackspace was on the block for a joint venture or outright acquisition.
A new version of the Enhanced Mitigation Experience Toolkit mostly improves compatibility with applications software, and specifically with Java and Chrome.
The best of ZDNet, delivered
- 1 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 2 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 3 31 ways to improve your iPhone's battery life
- 4 Seven privacy settings you should change immediately in iOS 8
- 5 Review: Tile Bluetooth tag (verdict: Great)