Axence nVision Pro provides network and user activity monitoring, software and hardware inventory, data leak prevention, remote control,...
Showing results 1 to 20 of 2,066
Phased migration to the new facility will take 18 months.
The inspector-general of Intelligence and Security has warned that Australia's top spy agency is under no obligation to delete data it receives under mandatory data-retention legislation.
Malaysia Airlines' website has been attacked by the Lizard Squad, with the hackers claiming to have compromised user data in the security breach.
It looks like ISPs and telcos may soon be facing the prospect of filtering their customers' data once again, thanks to proposed amendments to the Counter-Terrorism and Security Bill.
Nero BackItUp offers 4x local automatic backup (to hard disks, external storage, CD/DVD/Blu-ray and NAS) and your very own personal...
A study by IDC, commissioned by FireEye, has shown that organisations continue to be overwhelmed by security alerts, especially redundant ones, but they are turning to third-party IT security management to reduce the risk of missing critical alerts.
FireEye's latest report suggests that a number of businesses face over 10,000 cybersecurity alerts per month. What is being done to combat potential attacks?
InCircle is a mobile SNS solution of limited members for enterprises, schools, social clubs etc.InCircle can be used in a variety of...
Potential security vulnerabilities found in the NSW roads management network could lead to accidents and vehicle congestion, according to a new report by the NSW auditor-general.
One in four enterprises employs DevOps,and it's making a difference in software delivery. Data security is a concern, however.
The idea of virtualizing a function and then separating its management functions and them putting them under programmatic control has gotten quite a bit of attention in the market over the last year. We've heard about software defined networks, storage, and even whole data centers. Is support of only x86-based systems and their workloads enough?
Government has invested significant resources to build a "smart nation" supported by big data analytics, but it also needs to dedicate sufficient effort in addressing data security and privacy concerns.
Microsoft's Enhanced Mitigation Experience Toolkit (EMET) tightens the security screws in Windows and applications. It's set up for enterprise deployment and management.
Hundreds of millions of records have been stolen this year through hacks and data breaches as a result of poor, or flawed security. Here are the most notable stories of the year.
Data including usernames, passwords, and e-mail addresses belonging to customers of China's official online train ticketing site, 12306.cn, have been leaked, according to an IT security vendor.
FoundationDB wants developers to stop reaching for a traditional RDBMS as the answer to every data management problem.
Orion Health turns the key on its population health management solution delivering data between Blue Shield California and Cal INDEX.
Nearly a quarter of Australian organisations have suffered an interruption to their business due to an IT security attack or breach over the past 12 months, according to new research by Telstra.
Non-HTTPS pages provide no data security and the user should be reminded of that, argues the company. It's a big step.
Apart from IT infrastructure resources consolidation and security enhancements, Asian businesses will also be spending on IT-enabled innovation, social apps, and data analytics, reveals IDC survey.
Sony's security failure has been devastating, but the company is turning to technology in an attempt to halt downloads of its confidential data.
The best of ZDNet, delivered
- 1 Windows 10: You've got questions, I've got answers
- 2 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 3 Hands-on with Windows 10: Installing the latest Technical Preview
- 4 31 ways to improve your iPhone's battery life
- 5 How much does an iPhone 6 really cost? (Hint: It's way more than $199)