Nearly a quarter of Australian organisations have suffered an interruption to their business due to an IT security attack or breach over the past 12 months, according to new research by Telstra.
Showing results 1 to 20 of 1,194
Apart from IT infrastructure resources consolidation and security enhancements, Asian businesses will also be spending on IT-enabled innovation, social apps, and data analytics, reveals IDC survey.
After cyberattack resulted in internal networks being shuttered and confidential files leaked across the web, Sony has pulled in the professionals.
BitSight found that although the retail industry is still very much a hack target, 75 percent of retailers hit with a breach managed to improve their security effectiveness.
While only a handful of Australian organisations have tapped into the application economy, the rest of the market is beginning to cement plans to do so in areas of API management, security, and DevOps.
CA Technologies has announced several management solutions to provide enterprises with greater overview and control surrounding application deployment.
A collection of notable security news items for the week ending November 7, 2014. Covers enterprise, controversies, reports and more.
Sponsored by Redhat and Intel
The Internet of Things is set to revolutionise the way business is conducted. Recognising security concerns and infrastructure requirements needed to support IoT integration now will ensure that your enterprise IT architecture is ready to benefit from this technology in the future.
The older cellular encryption can be cracked by the National Security Agency, leaked documents previously showed. An upgrade to that security could make eavesdropping a lot harder.
MongoDB is putting a software as a service spin on its management tools that should make deployments easier for enterprise customers.
Security, document management, open architecture and the ability to manage users over devices are critical components when picking an enterprise mobility management platform. But focus will matter too.
Following a similar move by Hewlett-Packard this week, Symantec confirmed on Thursday that it will indeed split into two companies.
Companies running HP's software-defined networking compliant infrastructure will be able to buy apps to implement network services ranging from security to orchestration.
Sponsored by Redhat and Intel
The advent of visualization and cloud computing has eliminated physical bonds between users and IT infrastructure, leading to an entirely new set of IT security challenges for the enterprise.
In the red hot cloud computing market, major players such as Cisco, Dell, HP, IBM and VMware now offer their own distribution of OpenStack. Meanwhile, Piston Cloud is playing its security, management and installation as differentiators. Will it work?
It looks like the infiltrators had a look around in JPMorgan's June security breach -- but did not manage to siphon customer funds from bank accounts.
Aimed at providing security and management capabilities, AppShield leverages the AirWatch SDK and App Wrangling capabilities.
A draft document released by the Australian Department of Finance outlines requirements for government IT contractors to notify customers within 12 hours once they become aware of actual or suspected security incidents.
Box is also boosting cross-enterprise visibility as well as Security and Event Management (SIEM) integrations with HP and Splunk.
The tech giant's stock price has plummeted over the past 24 hours, sending Apple shares to a low not experienced since January.
The best of ZDNet, delivered
- 1 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 2 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 3 31 ways to improve your iPhone's battery life
- 4 Seven privacy settings you should change immediately in iOS 8
- 5 Review: Tile Bluetooth tag (verdict: Great)