- Android phones patched once a year, 87 percent exposed. Which brand is the most secure?
- SaaS discovery tools target growing shadow-IT problem
- SHA-1 hashing algorithm could succumb to $75K attack, researchers say
- Endpoint protection pitched as alternative for unpatchable EOL Windows systems
- AWS re:Invent 2015: AWS security and compliance tools embrace enterprise Clouds
corporate issues - News, Features, and Slideshows
Cisco this week announced its intent to acquire ThreatGRID, a New York-based maker of malware analysis and threat intelligence technology.
Threat protection company FireEye Tuesday announced it's acquiring nPulse Technologies, a privately-held maker of high-speed packet-capture, network analysis and forensics gear, for $70 million in a cash-stock deal expected to close during the second quarter.
Microsoft completed its $7.2 billion acquisition of Nokia today, bringing on board Nokia's smartphones, its not-so-smart feature phones and a Windows RT tablet.
Vic Gundotra, the man behind Google Plus and one of Google's most prominent executives, announced today that he will leave the company "effective immediately."
New Hampshire-based Infrastructure-as-a-Service company Dyn announced today that it would purchase managed DNS provider Nettica. Terms were not disclosed.
Taking Dell private is a bold move, but won't ensure success. If you can't recognize opportunities and execute properly as a public company, buying yourself shelter from investors only takes you so far. The bigger challenge will be rejiggering the corporate culture and core processes to make more innovation possible.
Four things are clear from Cisco’s better-than-expected Q1 FY 2013 results:
Tech vendors have been as bombastic as ever promoting the magical and amazing things their latest smartphones, cloud computing wares and network gear can do. When things go wrong, they're naturally a little less visible, but plenty of companies have sucked it up and done the right thing this year (perhaps with a little legal prodding here and there) and publicly apologized for minor and major customers inconveniences.
Just because you don't have a large enterprise doesn't mean you can't run your IT operation like the big guys. Here are seven ways to help your SMB--a small or medium-size business--implement some of the lessons big IT operations have learned over the years. Using these tips, you should be able to improve productivity, cut costs, and keep your business running smoothly.
Everyone knows that there's a correct way to carve poultry into parts. In fact, basic carving methods haven't changed much since the time of the Roman Empire a couple of thousand years ago. If you want to be considered a great cook, you need to learn these ancient lessons. For chickens, it usually sounds something like this:
Whitepapers about corporate issues
Threat Emulation uses a sandbox as a separate, isolated environment in which files are open and run to determine whether they are safe or malicious. In this infographic, we look at its implementation and the technology required to avoid infecting a corporate network.
- ADMA bases new code of conduct on self-regulation and customer centricity
- Listen and act on customer data, not competitor intelligence, says Pandora MD
- ANZ CTO: Digital disruption is fundamental change accelerated
- Facebook 'Reactions' test adds six emojis to the Like button
- CMO interview: Balancing agility, data-driven marketing and long-term thinking in a startup