Showing results 1 to 20 of 73

Verizon data breach report: State-sponsored attacks surge

Espionage campaigns seek data that furthers national interests, such as military or classified information, economy-boosting plans, insider information or trade secrets, and technical resources such as source code.

April 22, 2013

TASC, a UC4 Customer Profile

The proper selection of management tools for physical, virtual and cloud computing resources can make the difference between IT being able to have a life and being a slave to the data center.

October 30, 2011 by

Energy plant hack all wind says operator

There's no proof that a suspected hacking attack on the Supervisory Control and Data Acquisition (SCADA) systems of a Florida-based energy plant actually occurred, according to the operator, NextEra Energy Resources.

April 17, 2011 by

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.

Top Stories