Network Password Manager is an enterprise password management tool for businesses of any size. Using a single multiple user database,...
Showing results 1 to 20 of 30,733
Data breaches, hacks, and vulnerable software makes it easier than ever for a hacker to get access to your data. These simple steps can help mitigate it happening in the first place.
OS X may have a better security reputation than Windows, but it's far from perfect.
A collection of notable security news items for the week ending April 24, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
OPINION: In his RSA 2015 keynote on national cybersecurity threats, Homeland Security head Jeh Johnson told an audience of cybsersecurity experts something so wildly impossible, it almost went unnoticed.
Google CFO Patrick Pichette, who recently announced his imminent retirement, attributed the miss to ever-persistent currency fluctuations, defending annual growth could have been as high as 17 percent.
Nero BackItUp offers local automatic backup (to hard disks, external storage, CD/DVD/Blu-ray) and your very own personal online hard...
Just because tech firms want to restore the balance of overly-intrusive surveillance doesn't mean they're automatically letting the terrorists win.
Because no matter how many times they tell you that passwords are passe, you're still going to be using them for the rest of your life.
InCircle is a mobile SNS solution of limited members for enterprises, schools, social clubs etc.InCircle can be used in a variety of...
Major RDBMSes support RLS natively; Google has announced its BigQuery service does too.
With its acquisition of document security firm WatchDox, BlackBerry hopes to re-appeal to former customers who have moved on to other platforms.
Experts are calling for better legislation and supervision after Chinese government data pertaining to the personal information of millions of citizens was compromised.
Managed keys is a next step to that. Syncplicity will enable rights management keys to be stored in the cloud or in customer data centers away from the company's servers.
Google, Microsoft, PayPal among those who have already certified, registered OpenID Connect implementations
Another reason to connect your phone or tablet only to Wi-Fi networks you know and trust: An SSL certificate exploit could put your device in an unusable state.
The FBI is warning police and law enforcement officials to be on guard, amid threats by hacktivists to leak their personal information.
BlackBerry's smartphone business is limping along but the company knows mobile device security. It plans to apply that expertise to billions of potential connected things.
From the Atlas security project, to Ambari 2.0 and SequenceIQ, Hadoop veteran and Hortonworks co-founder Arun Murthy discusses some big-data themes of the moment.
The first day of RSA 2015's exhibitor show floor was packed with booths and oodles of creative, sometimes bizarre, gimmicks to attract attention. These stand out from the rest.
The next five years will see the criminal deployment of malware top the online crime threat to Australia, according to the Australian Crime Commission.
Only less than one percent of Android devices have been found to have a Potentially Harmful App (PHA) installed, according to Google.
The Secretary of Homeland Security addresses the growing number of attacks on cyber networks and the potential repercussions on the economy and national security.
The best of ZDNet, delivered
- 1 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 2 34 ways to improve your iPhone's battery life
- 3 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 4 So you have an app idea and want to make a bajillion bucks
- 5 ZDNet Cloud TV: Impact of cloud on HR (highlights)