Nearly a quarter of Australian organisations have suffered an interruption to their business due to an IT security attack or breach over the past 12 months, according to new research by Telstra.
Showing results 1 to 20 of 2,229
After the torrent search website's closure last week, Isohunt has stepped into the breach by relaunching The Pirate Bay's database.
Apart from IT infrastructure resources consolidation and security enhancements, Asian businesses will also be spending on IT-enabled innovation, social apps, and data analytics, reveals IDC survey.
Cisco acquired privately held Neohapsis, which provides security consulting services.
What services and events are predicted to shape malware, security and corporations next year?
After cyberattack resulted in internal networks being shuttered and confidential files leaked across the web, Sony has pulled in the professionals.
SQL databases with in-memory column stores, NoSQL with query languages; it looks like the two schools of database design have begun to merge.
Sponsored by Redhat and Intel
To maintain an application infrastructure that meets continually expanding business demands, organizations need more than a maintenance and support contract. Organizations need a proven, scalable, reliable, and secure enterprise platform.
BitSight found that although the retail industry is still very much a hack target, 75 percent of retailers hit with a breach managed to improve their security effectiveness.
At the Amazon Web Services (AWS) re:Invent conference in Las Vegas this week, AWS announced several important services. But most important is Amazon Aurora, a new high-performance database engine.
The Windows, Mac and Linux versions of Flash Player all have critical security vulnerabilities patched in a new version.
Sponsored by Sap
Security remains the top concern for enterprises considering a move to cloud services. This issue has been aggravated in our post-Snowden world. While security must be an important priority, it requires a sense of proportion rather than a fear-based approach.
A collection of notable security news items for the week ending November 7, 2014. Covers enterprise, controversies, reports and more.
Cost benefits make it tough for enterprises not to adopt cloud services in spite of the security risks, so they should embrace it by putting in place the necessary processes, say panelists at a discussion moderated by ZDNet blogger Eileen Yu.
The Department of Human Services is working to address concerns that the agency is not patching its systems quickly enough to avoid potential security breaches.
Windows 10 will build in standards-based two-factor authentication to every device, effectively neutering most phishing attacks and password database breaches. The company also announced new features aimed at securing corporate machines from malware attacks and data leaks.
The emergency services database containing the personal details of thousands of Victorians can not been breached by hackers, according to the organisation responsible for overseeing the emergency services communications system.
Telstra is working to bolster its position in Australia’s managed network and security services markets with the acquisition of Queensland’s Bridge Point.
The virtualisation specialist is to make its vCloud Air platform available from a datacentre in Germany, introduce new database and object storage services, and roll out the ability to pay per minute for infrastructure.
Commonwealth Bank's CIO David Whiteing has warned that there are a number of security risks associated with migrating ATM and Eftpos banking services from Telstra's network to the NBN fibre.
The best of ZDNet, delivered
- 1 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 2 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 3 31 ways to improve your iPhone's battery life
- 4 Seven privacy settings you should change immediately in iOS 8
- 5 Review: Tile Bluetooth tag (verdict: Great)