Nearly a quarter of Australian organisations have suffered an interruption to their business due to an IT security attack or breach over the past 12 months, according to new research by Telstra.
Showing results 1 to 20 of 776
Apart from IT infrastructure resources consolidation and security enhancements, Asian businesses will also be spending on IT-enabled innovation, social apps, and data analytics, reveals IDC survey.
After cyberattack resulted in internal networks being shuttered and confidential files leaked across the web, Sony has pulled in the professionals.
BitSight found that although the retail industry is still very much a hack target, 75 percent of retailers hit with a breach managed to improve their security effectiveness.
A collection of notable security news items for the week ending November 7, 2014. Covers enterprise, controversies, reports and more.
Sponsored by Redhat and Intel
The Internet of Things is set to revolutionise the way business is conducted. Recognising security concerns and infrastructure requirements needed to support IoT integration now will ensure that your enterprise IT architecture is ready to benefit from this technology in the future.
Recently appointed Azure CTO Mark Russinovich spells out Microsoft's espousal of the container cause on its cloud computing platform and his reservations about Docker security.
UPDATED: It's likely that large cloud computing players will have to adopt a security patching cadence similar to the one used by the software industry. In the future, the cloud will have its version of Patch Tuesday.
Companies running HP's software-defined networking compliant infrastructure will be able to buy apps to implement network services ranging from security to orchestration.
eG Innovations's newest release of its IT infrastructure monitoring product is all about improving usability and the ability to monitor cloud computing environments.
Sponsored by Redhat and Intel
The advent of visualization and cloud computing has eliminated physical bonds between users and IT infrastructure, leading to an entirely new set of IT security challenges for the enterprise.
In the red hot cloud computing market, major players such as Cisco, Dell, HP, IBM and VMware now offer their own distribution of OpenStack. Meanwhile, Piston Cloud is playing its security, management and installation as differentiators. Will it work?
The National Computational Infrastructure has built an on-demand, high-performance cloud computing environment to process data-intensive computations, such as climate change, earth system science, and life sciences research.
It looks like the infiltrators had a look around in JPMorgan's June security breach -- but did not manage to siphon customer funds from bank accounts.
A draft document released by the Australian Department of Finance outlines requirements for government IT contractors to notify customers within 12 hours once they become aware of actual or suspected security incidents.
The tech giant's stock price has plummeted over the past 24 hours, sending Apple shares to a low not experienced since January.
USIS, which performs background checks for the Department of Homeland Security, revealed that it was hacked earlier this month. The same company vetted Edward Snowden for the government.
A major contractor of the US Dept. of Homeland Security suffers a major breach, months after it was accused of faking hundreds of thousands of background checks.
Target's security breach almost pales in comparison to what might be the largest swath of stolen Internet credentials ever.
If you dined at one of these specific restaurants, your credit card details may have been stolen.
The best of ZDNet, delivered
- 1 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 2 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 3 31 ways to improve your iPhone's battery life
- 4 Seven privacy settings you should change immediately in iOS 8
- 5 Review: Tile Bluetooth tag (verdict: Great)