A study by IDC, commissioned by FireEye, has shown that organisations continue to be overwhelmed by security alerts, especially redundant ones, but they are turning to third-party IT security management to reduce the risk of missing critical alerts.
Showing results 1 to 20 of 5,531
UPDATED: The enterprise cloud company will begin trading its shares on the New York Stock Exchange after the opening bell on Friday under the ticker symbol "BOX."
FireEye's latest report suggests that a number of businesses face over 10,000 cybersecurity alerts per month. What is being done to combat potential attacks?
A Chinese official has said that Apple CEO Tim Cook agreed to have Apple products inspected by Chinese network experts to ensure information safety and national security.
Potential security vulnerabilities found in the NSW roads management network could lead to accidents and vehicle congestion, according to a new report by the NSW auditor-general.
On the back of its Ooyala acquisition, Telstra has continued its push to become a global technology company with the launch of a new video distribution network known as Global Media Switch.
Deploying complex, high performance applications both locally and in a cloud service provider's network can be very challenging. DivvyCloud believes that it has the solution to this problem.
Distibuted Denial of Service (DDoS) and routing attacks on online infrastructure increased last year according to a European agency for network security.
Should your enterprise own its data center? Would it be better to use the services of a hosting or collocation company? Does the emergence of cloud computing make this decision easier?
Adaptive Insights, a cloud-based corporate performance management vendor, has a new CEO. Tom Bogan comes from a lengthy finance career - something that could be of value as the company (and the sector) continues to experience growth.
Information security company High-Tech Bridge unveiled a security report documenting the flaw.
Sponsored by Red Hat and Intel
Enterprises of all shapes and sizes report that one major obstacle in moving to the cloud is security.
Several brilliant ex-HTC employees came together in an attempt to transform energy distribution and management in populous cities. The Gogoro Energy Network powers their first vehicle.
KPMG survey finds cloud computing is maturing beyond the demonstration stage, and is becoming a workforce management tool.
Microsoft's Enhanced Mitigation Experience Toolkit (EMET) tightens the security screws in Windows and applications. It's set up for enterprise deployment and management.
Sony will release "The Interview" via a bevy of online services and may just upend the current way of doing business. Here's a look at the ramifications.
Apple has issued a security update to address a critical security issue with OS X's Network Time Protocol service.
Australian telecommunications giant Telstra has announced that it will acquire Asian telecommunications network company Pacnet for $697 million in a deal that will double the telco's size in the Asia region.
A network time protocol security hole has been discovered and there are reports that exploits already exist for it and are being used in attacks.
Think 2014 has been a bad year for security, with high-profile cloud breaches and system hacks? Well, things aren't going to get any better in 2015.