- Satellite communication systems rife with security flaws, vulnerable to remote hacks
- Chrome OS may kill the password with Easy Unlock smartphone option
- Hackers try to blackmail plastic surgeon after stealing 500,000 patient records
- Michaels says breach at its stores affected nearly 3M payment cards
- DDoS Attackers Change Techniques To Wallop Sites
- NBN Co hits 105Mbps in limited FTTN trial
- Galaxy S5 deep-dive review: Long on hype, short on delivery
- NBN Co seeks ‘early resolution’ of TPG fibre threat
- TPG should pay rural levy for each FTTB service: NBN Co
- USB Type-C: Simpler, faster and more powerful
Riddle this: All your core performance metrics are glowing green, but customers on the other end of the network are still cursing your service. How can IT get to the root of the problem?
The Security for Business Innovation Council, comprised of IT security professionals from 19 companies worldwide, called Cloud computing the main disruptive force for 2013. In its report, "Information Security Shake-Up," the group said it was evident many organizations are preparing to move more business processes to the cloud. This year, it will even be "mission-critical apps and regulated data" consigned to the cloud.
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.
ORLANDO -- "You have to be a masochist to want to be an IT person,'' says Robert Carter. And he would know. Carter is the soft-spoken, hard-driving CIO who has been fighting for the past 11 years to transform IT operations at FedEx, where "the planes don't fly and trucks don't roll without IT services.''
The biggest business challenge today, in the minds of many information security officers, is the stealthy online infiltration by attackers to steal valuable proprietary information. The reality, they say, is that these so-called "advanced persistent threats" are so rampant and unrelenting they are forcing IT to rethink network security.
The newest piece of ransomware is particularly nasty and, once you've got it, it's a real pain to get rid of. Here's how to protect your corporate assets before getting bit.
IT is uniquely positioned to drive green IT projects by identifying opportunities for operational efficiency -- and helping to build the business case.
Want to know which organizations have earned a spot on Computerworld's Best Places to Work in IT list in multiple years? Browse, search or sort the listings from 1994 to the present.
Out of the blue, phishing attacks previously caught in the spam filter are getting through to employee inboxes.
Technology has become the heart and soul of every business, but IT workload and system complexity become more challenging. This whitepaper details the future of IT, the major challenges facing CIOs, and the three ways to transform IT so CIOs can lead the way.
Why do we continue to pay the earth for global roaming? With Telstra increasing global roaming charges by 100-500% in over 180 countries, bill shock can only get worse. This paper investigates why, what and how your company can address the need for global coverage.
- Experts: Avoid big mistakes with Oracle's Exadata
- Steve Jobs' character becomes issue in Silicon Valley no-hiring case
- FCC vote on incentive auction plan could further open broadband competition
- Google tech to bring 3D mapping smarts to NASA's space station robots
- Plastic computers taking shape, but won't replace silicon
- In pictures: Customer 360 Symposium hits the Hunter Valley
- Why CMOs must embrace the seven principles of agile marketing
- Google opens the floodgates for new 'social' ads
- Telefónica starts exchange for targeted mobile ads
- Crowdsource guide ranks marketing automation platforms by user recommendations and company size