HP's new enterprise IT spinoff could be strengthened with the acquisition of Aruba Networks.
Showing results 1 to 20 of 1,171
An HP report highlights how the bulk of exploits in 2014 revolved around vulnerabilities that were discovered before 2013.
The Sony hack, which US authorities claim was carried out by North Korea, crippled networks and destroyed data -- but not before the hackers stole terabytes of it.
According to the two companies, Good for Samsung Knox can eliminate virus and malware concerns that come with Android adoption in the enterprise.
Potential security vulnerabilities found in the NSW roads management network could lead to accidents and vehicle congestion, according to a new report by the NSW auditor-general.
Adobe patches nine vulnerabilities -- four of which are considered "critical" -- in order to protect against hackers who could exploit the bug to take control of an affected system.
A security researcher has discovered a way to infect Macs with malware virtually undetectable, that 'can't be removed,' and which can be installed using a modified Apple gigabit Ethernet Thunderbolt adapter.
Facebook has recently announced 'Facebook at work' for connecting professional contacts. If you don't want to mix your business and personal lives, have a look at these social networks you can use for work.
You might not hire a pickpocket to be a guard, but the UK's cybersecurity shortage has prompted a skill hire, no matter the origin.
China is high on the list of suspects as President Obama meets with the Chinese premier to discuss, among other things, cybersecurity.
The Obama Administration has admitted that a cyberattacker was able to gain access to the US government's systems.
New McAfee research claims that a worrying number of organizations are turning off advanced firewall features in order to avoid slowing down networks.
Traditional device level network monitoring is having trouble keeping up with the increasingly virtualized computing environment. NetBeez believes that its tools offer a solution.
The FBI's director believes that Chinese hackers are not all that subtle, but are still prolific enough to break into networks and walk out with the goods — costing US businesses billions every year.
Telecommunications carriers often support networks many times the size of large enterprise networks. The problem is that each application or function is supported by separate networking equipment. ConteXtream believes that its SDN technology could improve performance while saving money.
Hackers have reportedly broken into US government systems that store personal data on federal employees.
iboss Network Security has updated its enterprise security platform to offer better network protection against cybercriminals.
According to new research, the enterprise is ready to capitalize on the Internet of Things — but network capacity and security is scuppering adoption rates.
The UK government's secure network has come under attack from hackers controlled by a foreign state.
We're leaving the era of standalone social networks and moving to a far more interconnected world. The digital enterprise approach combines vestigial point solutions and legacy applications into cohesive next generation systems of engagement.
The best of ZDNet, delivered
- 1 33 ways to improve your iPhone's battery life
- 2 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 3 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 4 Seven privacy settings you should change immediately in iOS 8
- 5 So you have an app idea and want to make a bajillion bucks