An upgrade to Dell's systems management appliance delivers improved visibility of and control over networked PCs, servers and other devices.
Showing results 1 to 20 of 1,201
Malaysia Airlines' website has been attacked by the Lizard Squad, with the hackers claiming to have compromised user data in the security breach.
A study by IDC, commissioned by FireEye, has shown that organisations continue to be overwhelmed by security alerts, especially redundant ones, but they are turning to third-party IT security management to reduce the risk of missing critical alerts.
FireEye's latest report suggests that a number of businesses face over 10,000 cybersecurity alerts per month. What is being done to combat potential attacks?
Potential security vulnerabilities found in the NSW roads management network could lead to accidents and vehicle congestion, according to a new report by the NSW auditor-general.
Distributed Denial of Service (DDoS) and routing attacks on online infrastructure increased last year according to a European agency for network security.
Microsoft's Enhanced Mitigation Experience Toolkit (EMET) tightens the security screws in Windows and applications. It's set up for enterprise deployment and management.
Nearly a quarter of Australian organisations have suffered an interruption to their business due to an IT security attack or breach over the past 12 months, according to new research by Telstra.
Apart from IT infrastructure resources consolidation and security enhancements, Asian businesses will also be spending on IT-enabled innovation, social apps, and data analytics, reveals IDC survey.
After cyberattack resulted in internal networks being shuttered and confidential files leaked across the web, Sony has pulled in the professionals.
BitSight found that although the retail industry is still very much a hack target, 75 percent of retailers hit with a breach managed to improve their security effectiveness.
While only a handful of Australian organisations have tapped into the application economy, the rest of the market is beginning to cement plans to do so in areas of API management, security, and DevOps.
CA Technologies has announced several management solutions to provide enterprises with greater overview and control surrounding application deployment.
A collection of notable security news items for the week ending November 7, 2014. Covers enterprise, controversies, reports and more.
Sponsored by Redhat and Intel
The Internet of Things is set to revolutionise the way business is conducted. Recognising security concerns and infrastructure requirements needed to support IoT integration now will ensure that your enterprise IT architecture is ready to benefit from this technology in the future.
The older cellular encryption can be cracked by the National Security Agency, leaked documents previously showed. An upgrade to that security could make eavesdropping a lot harder.
MongoDB is putting a software as a service spin on its management tools that should make deployments easier for enterprise customers.
Security, document management, open architecture and the ability to manage users over devices are critical components when picking an enterprise mobility management platform. But focus will matter too.
Following a similar move by Hewlett-Packard this week, Symantec confirmed on Thursday that it will indeed split into two companies.
Companies running HP's software-defined networking compliant infrastructure will be able to buy apps to implement network services ranging from security to orchestration.
The best of ZDNet, delivered
- 1 Windows 10: You've got questions, I've got answers
- 2 Hands-on with Windows 10: Installing the latest Technical Preview
- 3 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 4 31 ways to improve your iPhone's battery life
- 5 How much does an iPhone 6 really cost? (Hint: It's way more than $199)