Think 2014 has been a bad year for security, with high-profile cloud breaches and system hacks? Well, things aren't going to get any better in 2015.
Showing results 1 to 20 of 1,025
Nearly a quarter of Australian organisations have suffered an interruption to their business due to an IT security attack or breach over the past 12 months, according to new research by Telstra.
Apart from IT infrastructure resources consolidation and security enhancements, Asian businesses will also be spending on IT-enabled innovation, social apps, and data analytics, reveals IDC survey.
Close collaboration between development and operations teams can lead to more resilient and secure cloud applications. The challenge is culture, not technology.
As part of its FutureScape prediction series for 2015, IDC looked at the impending IoT space from a broad spectrum of angles, including network capacity, security and cloud.
After cyberattack resulted in internal networks being shuttered and confidential files leaked across the web, Sony has pulled in the professionals.
There are now cloud certifications for all roles -- from developers to administrators to architects to security specialists.
Cloud security platform provider CipherCloud has picked up $50 million in a funding round, which was led by Transamerica Ventures.
BitSight found that although the retail industry is still very much a hack target, 75 percent of retailers hit with a breach managed to improve their security effectiveness.
Microsoft has purchased its fifth non-U.S.-based company this year by buying Israeli cloud security vendor Aorato Ltd.
Security vendors enable extra layers of security for AWS as well as tout new reference architectures for the cloud.
CA Technologies has announced several management solutions to provide enterprises with greater overview and control surrounding application deployment.
Sponsored by Sap
Security remains the top concern for enterprises considering a move to cloud services. This issue has been aggravated in our post-Snowden world. While security must be an important priority, it requires a sense of proportion rather than a fear-based approach.
A collection of notable security news items for the week ending November 7, 2014. Covers enterprise, controversies, reports and more.
Sponsored by Redhat and Intel
Infrastructure-as-a-Service (IaaS) is a model where servers and other resources are provisioned as required over the cloud. This model provides self-service, on-demand access to IT resources, which means users can create and access tools they need within minutes, instead of days, weeks or months.
Dubbed as the Dynamic Cloud Security portfolio, 200 IBM engineers have been building the Dynamic Cloud Security portfolio for cloud and on-premise deployments.
Security, cloud and analytics top 2015 wish lists.
Security concerns of midsize businesses are preventing them from taking full advantage of cloud, mobility, and big data.
Cost benefits make it tough for enterprises not to adopt cloud services in spite of the security risks, so they should embrace it by putting in place the necessary processes, say panelists at a discussion moderated by ZDNet blogger Eileen Yu.
The development follows up a security update from the cloud storage provider, bolstering Dropbox's plan to maintain data security, confidentiality, integrity, and availability.
The best of ZDNet, delivered
- 1 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 2 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 3 31 ways to improve your iPhone's battery life
- 4 Seven privacy settings you should change immediately in iOS 8
- 5 Review: Tile Bluetooth tag (verdict: Great)