Malaysia Airlines' website has been attacked by the Lizard Squad, with the hackers claiming to have compromised user data in the security breach.
Showing results 1 to 20 of 2,407
A study by IDC, commissioned by FireEye, has shown that organisations continue to be overwhelmed by security alerts, especially redundant ones, but they are turning to third-party IT security management to reduce the risk of missing critical alerts.
FireEye's latest report suggests that a number of businesses face over 10,000 cybersecurity alerts per month. What is being done to combat potential attacks?
Potential security vulnerabilities found in the NSW roads management network could lead to accidents and vehicle congestion, according to a new report by the NSW auditor-general.
Distributed Denial of Service (DDoS) and routing attacks on online infrastructure increased last year according to a European agency for network security.
Microsoft's Enhanced Mitigation Experience Toolkit (EMET) tightens the security screws in Windows and applications. It's set up for enterprise deployment and management.
Managing the complexity of virtual desktop infrastructure can be a major part of realizing any savings an organization might see. Alabama College of Osteopathic Medicine selected tools from Unidesk. One of its staff explains why.
Nearly a quarter of Australian organisations have suffered an interruption to their business due to an IT security attack or breach over the past 12 months, according to new research by Telstra.
Finzsoft Solutions has signed a five-year agreement with IBM to move its finance and banking applications to the cloud as part of its hybrid cloud infrastructure.
Apart from IT infrastructure resources consolidation and security enhancements, Asian businesses will also be spending on IT-enabled innovation, social apps, and data analytics, reveals IDC survey.
Together with the launch of updated custom Android software PrivatOS, the handset maker has revealed a new store dedicated to security and privacy applications.
Hitachi Data Systems has predicted that in 2015, the market will see enterprises deploy their critical legacy applications into a hybrid cloud infrastructure.
Microsoft's MDOP 2014 R2 set of management and deployment tools for Windows, adds new application and user-experience virtualization features.
As well as unveiling the beta of its IBM Containers Docker-based service, the enterprise giant is to sell Docker's container management suite, along with new open-source orchestration tools.
Sponsored by Redhat and Intel
Organizations that want to tap the full capabilities of cloud for the development of enterprise-grade business applications need to equip their IT and development teams with the right tools.
After cyberattack resulted in internal networks being shuttered and confidential files leaked across the web, Sony has pulled in the professionals.
BitSight found that although the retail industry is still very much a hack target, 75 percent of retailers hit with a breach managed to improve their security effectiveness.
While only a handful of Australian organisations have tapped into the application economy, the rest of the market is beginning to cement plans to do so in areas of API management, security, and DevOps.
CA Technologies has announced several management solutions to provide enterprises with greater overview and control surrounding application deployment.
Other performance monitoring and management tools tell administrators what problems occurred. Loggly claims that its tool can quickly tell them why the problems happened.
The best of ZDNet, delivered
- 1 Windows 10: You've got questions, I've got answers
- 2 Hands-on with Windows 10: Installing the latest Technical Preview
- 3 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 4 31 ways to improve your iPhone's battery life
- 5 How much does an iPhone 6 really cost? (Hint: It's way more than $199)