- Russian SMS Trojan for Android hits US, dozens of other countries
- Report: Attackers have their sights set on the cloud
- Data breaches can be traced back to nine attack 'patterns', says Verizon report
- SMS spam rises in UK as 'accident compensation' scammers get busy
- Verizon breach report makes case for behavioral analytics
- USB Type-C: Simpler, faster and more powerful
- Data retention: Just like diamonds, metadata is forever
- Should Australians prepare for rubber-hose cryptanalysis?
- Connected vehicle tech trial to start trucking on in NSW
- UPDATED: 4G in Australia: The state of the nation
Systems integrator CSC and service provider AT&T are combining forces in an effort to take on industry giants neither company would have been able to launch a formidable campaign against individually, and the union could foreshadow other partnerships of the like.
Cisco (NASDAQ: CSCO) Tuesday announced a $2.7 billion deal to buy Sourcefire (NASDAQ: FIRE), the 12-year-old intrusion detection and prevention security vendor whose founder invented the open-source Snort IDS.
Service level agreements in the cloud computing market are skewed in the favor of providers, can be difficult for customers to decipher and in some cases are rigid and non-negotiable. Those are some of the findings from the Cloud Standards Customer Council, a user advocacy group that recently reviewed SLAs from some of the industry’s largest providers.
The Swiss National Supercomputing Center will upgrade its supercomputer with Nvidia graphics processors to enable the system to more accurately predict the weather in the steep mountains of the Swiss Alps.
CSC has agreed to sell Paxus, its Australian IT staff unit, to South African employment services company Adcorp for US$73.5 million.
When most people who track the industry think of the Cloud computing market, big names like Amazon Web Services, Microsoft Azure, Google, Rackspace, Verizon Terremark and others come to mind. HP, Joyent, IBM and Dell even. But Computer Sciences Corporation (CSC)?
CIOs are finding that getting printing under control not only saves money, it opens the door to thinking about their printing requirements more strategically
Simply being compliant is not enough to mitigate attacks and protect critical information. Organizations can reduce chances of compromise by shifting away from a compliance-driven approach. This guide provides the Top 20 Critical Security Controls (CSCs) developed by the SANS Institute to address the need for a risk-based approach to security.
Why do we continue to pay the earth for global roaming? With Telstra increasing global roaming charges by 100-500% in over 180 countries, bill shock can only get worse. This paper investigates why, what and how your company can address the need for global coverage.
- Google will push mobile app installs in search and YouTube
- Salesforce at 15: Industry disruptor wards off midlife crisis
- Branded comments and shares a growing part of the social engagement mix for marketers
- 8 things we learnt about big data analytics from the Adobe Summit
- AdRoll secures US$70 million to ramp up retargeting platform development