IT managers are finding it difficult to keep their applications and data safe in the cloud, and many are slowing cloud adoption because of it. That was one of the findings of an Intel cloud security report that surveyed 2,000 IT professionals in...
Apple has acquired the Workflow automation app, which allows iOS users to trigger a sequence of tasks across apps with a single tap. A spokesman for Apple confirmed on Wednesday the company's acquisition of DeskConnect, the developer of the...
Companies that use security products to inspect HTTPS traffic might inadvertently make their users' encrypted connections less secure and expose them to man-in-the-middle attacks, the U.S. Computer Emergency Readiness Team warns. US-CERT, a...
Network segmentation is growing in popularity as a means of controlling levels of access to sensitive information across a network environment. At a minimum, enterprises need rich, contextual information in order to determine the appropriate users...
A large number of organizations across Hong Kong (80 percent) agree that Agile and DevOps are critical to successful digital transformation, according to results from a new CA Technologies global study on Agile and DevOps practices. The study,...
Amazon today announced Chime, a unified communications as a service (UCaaS) offering hosted in Amazon Web Service’s cloud. Amazon is entering a crowded market of UC solutions, some of which are already cloud-based and others that run on...
Linux system administrators should be on the watch for kernel updates because they fix a local privilege escalation flaw that could lead to a full system compromise. The vulnerability, tracked as CVE-2017-6074, is over 11 years old and was likely...
For decades, enterprise computing environments have been composed of servers, storage and networking equipment developed by different vendors. Those choices often hinged on the best products to power applications and data -- as well as the enticing...