In today's network environments, malware that evades legacy defenses is pervasive, with communication and activity occurring up to once every three minutes. Unfortunately, most of this activity is inconsequential to the business. You would think that would be good news right? The problem is that incident responders have no good way of distinguishing inconsequential malware from (potentially) highly damaging malware. As a result, they spend way too much time and resources chasing red herrings while truly malicious activity slips past....
Automation, virtualization, cloud computing -- these technology trends are transforming the data center and enabling companies to lower costs, increase flexibility and improve reliability. However, these shifts require IT, and their outsourcing providers, to rethink traditional strategies....
Microsoft didn't disappoint with the new and improved capabilities it announced and demonstrated for Office 365 this week, but how well they work in the real world remains to be seen....
The iOSphere overflowed with gratitude for the monumental failure, the colossal collapse, the flop, the fiasco, the disaster of the iPhone 5C because it has finally convinced Apple to give the iPhone 6 a screen larger than four inches....
Hackers attacked the personal blog of Mt. Gox CEO Mark Karpeles on Sunday and posted what they claim is a ledger showing a balance of some 950,000 bitcoins based on records they obtained from the defunct exchange for the virtual currency....
Protecting privacy was on the minds of almost all the dignitaries assembled in Hanover, Germany, on Sunday night to open this year's Cebit trade show, the theme of which is "datability," or big data with responsibility....
Two surveys show that starting salaries for recent college graduates with computer science degrees has slipped, but pay might not be the most important factor for IT professionals when it comes to choosing jobs....
The National Institute of Standards and Technology (NIST) warns that moving from IPv4 to IPv6 is a process fraught with peril, which may explain why government agencies are so far behind their own deadlines for implementation....
Trying to protect your expanding virtual machine (VM) empire will require a security product that can enforce policies, prevent VMs from being terminated or infected, and deliver the virtual equivalents of firewalls, IPS and anti-virus solutions....