- French Treasury accidentally signs SSL certificate for Google.com domains
- Data-stealing malware pretends to be Microsoft IIS server module
- Encrypted text messages may soon be on the way to some Android phones
- Google, Microsoft, others join in calling on NSA limits
- Russian-speaking group offers bulletproof hosting in Syria, Lebanon
- Amazon drones are 'fantasy,' says eBay CEO
- On snooping disclosures, AT&T and Internet companies are like night and day
- In his own words: Tony Abbott on the NBN
- TPG buys AAPT
- US faces major Internet image problem, former gov't official says
The Cloud Security Alliance (CSA) is putting forward an innovative encryption-based security architecture for software-defined networks and cloud environments that draws some of its inspiration from high-security networks used by the U.S. Department of Defense and intelligence agencies.
Teams of researchers are hoping to give life to a six-foot, 330-pound humanoid robot at the the Robotics Challenge in Homestead, Fla. on Dec. 20 and 21.
The U.S. Army will pay Apptricity, a supply chain and financial software developer, US$50 million to settle a copyright infringement claim that it used but didn't pay for thousands of copies of logistics management software.
The U.S. National Security Agency has repeatedly tried to compromise Tor, the government-funded online anonymity tool, but has had little success, according to a new report in the U.K.'s Guardian.
Hackers backed by Iran have penetrated an unclassified U.S. Navy network in one of the most serious incidents of cybercrime yet by the Middle East nation, according to a report Friday.
China's remarkable success in infiltrating U.S. government, military and corporate networks in recent years shouldn't be seen as a sign that the country is gaining on the U.S. lead in cybertechnology, security experts say. They're just very persistent and very good at remaining undetected for long periods of time.
They're security myths, oft-repeated and generally accepted notions about IT security that ... simply aren't true. As we did a year ago, we've asked security professionals to share their favorite "security myths" with us. Here are 13 of them.
How can you avoid making major mistakes when operating and maintaining your data centre(s)? The key lies in the methodology behind your operations and maintenance program. This whitepaper explores the top ten mistakes in data centre operations. Read now.
GeForms allows you to create your own forms or fill in existing forms electronically. Using GeForms you are provided with sophisticated form design tools which ...
Think back to the last time all your employees were in the office, at their desks, on the same day. It’s no surprise that you might struggle, between travel and off-site meetings, remote staff, flexible schedules and sick days. In today's competitive business climate, organisations need to maintain productivity and connectedness with their staff, despite not always being onsite. In this whitepaper, we look at five ways you can improve productivity, no matter where employees are.
- Acronis delivers backup and protection with Microsoft Active Directory
- Rate of innovation remains high in enterprise: Motorola
- Veeam Cloud Provider program growing more than 100 per cent YoY
- New virtual currency stymies Christmas traffic torrent
- Immense growth pushing datacentres to unsustainable point: Gartner
- B2B customers are increasingly led by consumer habits and experience
- CMO interview: Marketing the wool off a sheep’s back
- Mobile browser usage share hits 20% for the first time
- Apple knows where shoppers are in its stores with nationwide iBeacon rollout
- Should Facebook, Yahoo and Twitter really judge what's news?