Edward Snowden and Bruce Schneier talk data encryption and privacy in a networked world. The Data Mill reports.
Will Microsoft's Windows 10, with a dusting of magic from HoloLens, reel enterprises and consumers back in? Also in Searchlight, President Obama targets cybersecurity in State of the Union speech; the most common password of 2014 was '123456.'
The 2015 outlook for information technology includes higher budgets and an emphasis on cloud, according to TechTarget's annual IT priorities survey.
Follow these guidelines to expand data center capacity without the terror of wasted space or, even worse, tight capacity after move-in.
The mainframe is IT's original cloud, and there are still ways to float cloud operations onto big iron today. But is it pragmatic?
IBM's financial woes continue as the company reports down revenues for 2014 with its server hardware business leading the downward trend.
A10 Networks has re-architected the software within its application delivery controller, making it more customizable for inserting Layer 4-7 services in SDN, NFV and cloud applications.
Expert Fernando Gont explains how to probe whether your IPv6 address components are vulnerable to attack.
NetFlow eliminated the hassle of network troubleshooting after a school complained about its Internet access.
Adobe's latest Flash zero day patch came Saturday, just two days after reports that the vulnerability was being exploited by drive-by-download attacks.
A Ponemon Institute report highlights the biggest risks to endpoint security, and what IT professionals plan to do to fight back, including one controversial tactic in malware protection.
News roundup: An of onslaught Adobe, Oracle, OpenSSL, Chrome and Firefox patches highlights the sad state of software security in 2015. Plus, security budgets increasing; HealthCare.gov security woes; false-positive alerts cost millions annually.
Learn about tips for choosing a testing service and whether it makes sense to test outside the business.
Private and non-public data must not be compromised during testing. Learn about data masking and the vendors that offer data masking tools.
Automated testing and continuous development have become the driving force for CTO Andy Piper as Push Technology evolves its middleware platform.
Find out the six finalists we think offer the best storage systems of 2014, while still using ‘old-fashioned’ spinning disk.
The finalists in the storage management tools category offer analytics, monitoring and automation for physical and virtual environments.
The Law Offices of Joe Bornstein filled performance, data classification and data protection checkboxes with startup DataGravity's Discovery Series array.