A study by IDC, commissioned by FireEye, has shown that organisations continue to be overwhelmed by security alerts, especially redundant ones, but they are turning to third-party IT security management to reduce the risk of missing critical alerts.
Showing results 1 to 20 of 1,819
FireEye's latest report suggests that a number of businesses face over 10,000 cybersecurity alerts per month. What is being done to combat potential attacks?
Potential security vulnerabilities found in the NSW roads management network could lead to accidents and vehicle congestion, according to a new report by the NSW auditor-general.
Although Docker container technology has rocketed in popularity, new research from Gartner suggests its rapid rise hasn't necessarily outstripped its security features.
Microsoft's Enhanced Mitigation Experience Toolkit (EMET) tightens the security screws in Windows and applications. It's set up for enterprise deployment and management.
Nearly a quarter of Australian organisations have suffered an interruption to their business due to an IT security attack or breach over the past 12 months, according to new research by Telstra.
Sony's security failure has been devastating, but the company is turning to technology in an attempt to halt downloads of its confidential data.
After cyberattack resulted in internal networks being shuttered and confidential files leaked across the web, Sony has pulled in the professionals.
BitSight found that although the retail industry is still very much a hack target, 75 percent of retailers hit with a breach managed to improve their security effectiveness.
While only a handful of Australian organisations have tapped into the application economy, the rest of the market is beginning to cement plans to do so in areas of API management, security, and DevOps.
CA Technologies has announced several management solutions to provide enterprises with greater overview and control surrounding application deployment.
A collection of notable security news items for the week ending November 7, 2014. Covers enterprise, controversies, reports and more.
Sponsored by Redhat and Intel
The Internet of Things is set to revolutionise the way business is conducted. Recognising security concerns and infrastructure requirements needed to support IoT integration now will ensure that your enterprise IT architecture is ready to benefit from this technology in the future.
Security concerns of midsize businesses are preventing them from taking full advantage of cloud, mobility, and big data.
Finance, security and healthcare are set to be the main sectors to use new graph analytics technology from software firm Actian.
The Victorian government is dipping into its AU$12 million Technology Innovation Fund to back a program that is aimed at digitising courtroom paperwork and providing a mobile solution for case management and transparency.
Security, document management, open architecture and the ability to manage users over devices are critical components when picking an enterprise mobility management platform. But focus will matter too.
Following a similar move by Hewlett-Packard this week, Symantec confirmed on Thursday that it will indeed split into two companies.
Cisco's Intercloud finally allows CIOs to focus more on management and less on technology.
In the red hot cloud computing market, major players such as Cisco, Dell, HP, IBM and VMware now offer their own distribution of OpenStack. Meanwhile, Piston Cloud is playing its security, management and installation as differentiators. Will it work?