Should your enterprise own its data center? Would it be better to use the services of a hosting or collocation company? Does the emergence of cloud computing make this decision easier?
Showing results 1 to 20 of 2,274
Although Docker container technology has rocketed in popularity, new research from Gartner suggests its rapid rise hasn't necessarily outstripped its security features.
The web services giant introduces a new feature that could reduce the cost and security risks of linking virtual instances on its platform.
Many suppliers engaged with the OpenStack community are claiming that their approach, products and services are the best way to use OpenStack as a foundation of cloud computing projects.
Today's smartphones and tablets offer computing power, memory and storage that surpass that offered by mainframe computers in the 1990s. But security remains an ongoing challenge.
Government has invested significant resources to build a "smart nation" supported by big data analytics, but it also needs to dedicate sufficient effort in addressing data security and privacy concerns.
Hacker conference Chaos Communication Congress 31c3 is under way in Hamburg, Germany right now where three SS7 talks have revealed the ease of invasive cell phone surveillance.
Nearly a quarter of Australian organisations have suffered an interruption to their business due to an IT security attack or breach over the past 12 months, according to new research by Telstra.
Apart from IT infrastructure resources consolidation and security enhancements, Asian businesses will also be spending on IT-enabled innovation, social apps, and data analytics, reveals IDC survey.
Cisco acquired privately held Neohapsis, which provides security consulting services.
NEC Australia has strengthened its position as the Northern Territory's go-to provider of IT services, inking an AU$55 million end-user computing contract with the top end's government.
What value can be placed on the letter 'S'? If it's the 'S' in HTTPS, it could equate to a loss of productivity due to increased latency, greater battery drain for certain connected devices, and the loss of in-network value-added services, according to new research.
What services and events are predicted to shape malware, security and corporations next year?
After cyberattack resulted in internal networks being shuttered and confidential files leaked across the web, Sony has pulled in the professionals.
Symantec wasn't the only company following Regin. Kaspersky and F-Secure have something to say about who was hit. Regin also spies on GSM cellular networks.
BitSight found that although the retail industry is still very much a hack target, 75 percent of retailers hit with a breach managed to improve their security effectiveness.
Research shows that small organizations are fast becoming the target of choice for cybercriminals, but many of these businesses have no idea how to approach data security.
Sponsored by Sap
Security remains the top concern for enterprises considering a move to cloud services. This issue has been aggravated in our post-Snowden world. While security must be an important priority, it requires a sense of proportion rather than a fear-based approach.
A collection of notable security news items for the week ending November 7, 2014. Covers enterprise, controversies, reports and more.
Tech Pro Research's latest report shows how the technology landscape will evolve over the next three years, identifying the products and vendors that will stay relevant, and those that will become obsolete.