Phased migration to the new facility will take 18 months.
Showing results 1 to 20 of 2,836
Mexico is considering the imposition of sanctions against Google over a possible breach of data protection law.
The inspector-general of Intelligence and Security has warned that Australia's top spy agency is under no obligation to delete data it receives under mandatory data-retention legislation.
This security hole, which impacts many older versions of Linux and some current ones, should be patched as soon as possible.
Malaysia Airlines' website has been attacked by the Lizard Squad, with the hackers claiming to have compromised user data in the security breach.
It looks like ISPs and telcos may soon be facing the prospect of filtering their customers' data once again, thanks to proposed amendments to the Counter-Terrorism and Security Bill.
A study by IDC, commissioned by FireEye, has shown that organisations continue to be overwhelmed by security alerts, especially redundant ones, but they are turning to third-party IT security management to reduce the risk of missing critical alerts.
FireEye's latest report suggests that a number of businesses face over 10,000 cybersecurity alerts per month. What is being done to combat potential attacks?
Potential security vulnerabilities found in the NSW roads management network could lead to accidents and vehicle congestion, according to a new report by the NSW auditor-general.
The creator of the Linux kernel and Git has said that security issues should be publicly disclosed, not swept under the rug where vendors can leave them unsolved for years.
One in four enterprises employs DevOps,and it's making a difference in software delivery. Data security is a concern, however.
Ahead of the State of the Union later this month, the president's proposed laws aim to force companies to disclose hacks and breaches inside a month.
The FBI's chief says hackers responsible for Sony's data breach "got sloppy," which enabled forensics teams to unmask the culpable country.
The idea of virtualizing a function and then separating its management functions and them putting them under programmatic control has gotten quite a bit of attention in the market over the last year. We've heard about software defined networks, storage, and even whole data centers. Is support of only x86-based systems and their workloads enough?
Government has invested significant resources to build a "smart nation" supported by big data analytics, but it also needs to dedicate sufficient effort in addressing data security and privacy concerns.
Microsoft's Enhanced Mitigation Experience Toolkit (EMET) tightens the security screws in Windows and applications. It's set up for enterprise deployment and management.
Hundreds of millions of records have been stolen this year through hacks and data breaches as a result of poor, or flawed security. Here are the most notable stories of the year.
Data including usernames, passwords, and e-mail addresses belonging to customers of China's official online train ticketing site, 12306.cn, have been leaked, according to an IT security vendor.
FoundationDB wants developers to stop reaching for a traditional RDBMS as the answer to every data management problem.
The best of ZDNet, delivered
- 1 Windows 10: You've got questions, I've got answers
- 2 Hands-on with Windows 10: Installing the latest Technical Preview
- 3 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 4 31 ways to improve your iPhone's battery life
- 5 How much does an iPhone 6 really cost? (Hint: It's way more than $199)