- French Treasury accidentally signs SSL certificate for Google.com domains
- Data-stealing malware pretends to be Microsoft IIS server module
- Encrypted text messages may soon be on the way to some Android phones
- Google, Microsoft, others join in calling on NSA limits
- Russian-speaking group offers bulletproof hosting in Syria, Lebanon
- Amazon drones are 'fantasy,' says eBay CEO
- On snooping disclosures, AT&T and Internet companies are like night and day
- In his own words: Tony Abbott on the NBN
- TPG buys AAPT
- US faces major Internet image problem, former gov't official says
network security in pictures
The New York Times blamed a prolonged website outage on Tuesday on a hacking attack at the company's Australia-based domain name registrar, Melbourne IT.
After being subjected to an automated spambot email attack which lasted one week, IT staff at Perisher Resort decided to look for a new security solution.
Australian IT security and network operations professionals have cited manual processes and poor visibility of security policies as their biggest challenges according to a new report.
The Wi-Fi Alliance unveiled a certification program for 802.11ac Wi-Fi (also known as 5G Wi-Fi) designed to make sure devices using the wireless technology interoperate with older hardware.
Plugging network security leaks is an essential responsibility for companies, private organizations and technology professionals. Achieving that goal requires discovery tools that scour every asset, including those not currently under management, and also map connectivity between institutions involved with an organization's sensitive information around IT compliance, corporate security, product development, critical infrastructure protection and other relevant issues.
Today is the final Microsoft Patch Tuesday for 2010. It has been a busy year for Microsoft when it comes to security bulletins, and December is no exception as Microsoft closes out the year with a record 17 security bulletins. With only a week or so until many IT admins plan to kiss 2010 goodbye and break for the holidays, it is important to understand and prioritize the latest patches for quick implementation.
Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users
Security pros and government officials warn of a possible cyber 9/11 involving banks, utilities, other companies, or the Internet
Laptops used to be the only devices on the company's wireless network. But Wi-Fi has become a ubiquitous standard used by a host of devices -- including desktop PCs, laptops, netbooks, tablets, smartphones, printers, storage devices, and projectors.
There are more than a few critics of cloud computing, even at PCWorld; I'm probably one of them. But I've been turning over in my mind different perspectives on the cloud. I've tried to set aside the views of the IT executive, who seems to dominate the debate.
Yet another survey is indicating that security is a big issue for those intending to take up cloud computing.
Whitepapers about network security
For enterprise IT security organizations, the evolution of applications and threats, coupled with the stagnation of traditional network security technology has resulted in a loss of visibility and control. This paper examines three different organizations, the legacy infrastructure they replaced, the firewalls they deployed and the subsequent savings.
For years, most companies have dealt with the evolving dynamics of data archiving by addressing an immediate need rather than building a long-term strategy. But over time, putting all information on costly storage is likely to be very expensive. This whitepaper explains why it’s time for organizations to start to strategically evaluate archive solutions for capabilities they need, both now and in the future. While no technology is future proof, an archiving solution can make you “future ready.”
DriverScanner scans your computer and provides you with a list of drivers that need to be updated. All you have to do, then, is simply ...
Think back to the last time all your employees were in the office, at their desks, on the same day. It’s no surprise that you might struggle, between travel and off-site meetings, remote staff, flexible schedules and sick days. In today's competitive business climate, organisations need to maintain productivity and connectedness with their staff, despite not always being onsite. In this whitepaper, we look at five ways you can improve productivity, no matter where employees are.
- Acronis delivers backup and protection with Microsoft Active Directory
- Rate of innovation remains high in enterprise: Motorola
- Veeam Cloud Provider program growing more than 100 per cent YoY
- New virtual currency stymies Christmas traffic torrent
- Immense growth pushing datacentres to unsustainable point: Gartner
- B2B customers are increasingly led by consumer habits and experience
- CMO interview: Marketing the wool off a sheep’s back
- Mobile browser usage share hits 20% for the first time
- Apple knows where shoppers are in its stores with nationwide iBeacon rollout
- Should Facebook, Yahoo and Twitter really judge what's news?