News
News
- March 06, 2015
06 Mar'15
Windows vulnerable to Freak attacks, says Microsoft
Microsoft says all supported versions of its Windows operating system are vulnerable to attacks exploiting the Freak security vulnerability.
- March 06, 2015
06 Mar'15
SAP cuts jobs as it prepares for 2020 strategy
SAP is set to cut its workforce by 3%, with around 2,200 people set to lose their jobs.
- March 06, 2015
06 Mar'15
BitTorrent Sync NAS file sharing gives users common ID
Consumer peer-to-peer software maker releases Sync 2.0 for secure file sharing between smartphones, desktops and NAS devices.
-
- March 06, 2015
06 Mar'15
Intronis improves ECHOplatform's recovery times
Intronis ECHOplatform, sold exclusively through service providers, can now instantly recover Microsoft Hyper-V and physical server images.
- March 06, 2015
06 Mar'15
Red Hat's Linux containers target security
Linux containers are nothing new. But with the rise of Docker, Red Hat Atomic Host is being rolled out as an OS focusing on security and the surrounding infrastructure.
- March 06, 2015
06 Mar'15
ONF launches site to promote SDN deployments
The newly formed Software Leadership Council hopes that OpenSourceSDN.org will spur the development of tools and apps engineered to fuel widespread SDN adoption.
- March 06, 2015
06 Mar'15
CSA looks to patch holes in government clouds
The Cloud Security Alliance's new frameworks for the European Union offer baseline security measures for government agencies worldwide deploying secure cloud services.
- March 06, 2015
06 Mar'15
Reassessing the risk of personal email use for business
Recent reports about Hillary Clinton's personal email use for government work has ignited a discussion among IT pros.
- March 06, 2015
06 Mar'15
Oracle and Oregon trade lawsuits again over Cover Oregon
Oracle and Oregon start another round of lawsuits about Cover Oregon, with Oracle alleging that Cover Oregon failed as a campaign re-election distraction.
- March 05, 2015
05 Mar'15
Has IBM found its place in the digital world?
Late last year, amid poor financial results and doubts over its direction, IBM announced $3.6B worth of IT infrastructure outsourcing deals.
-
- March 05, 2015
05 Mar'15
China and US cross swords over software backdoors
Barack Obama criticizes Chinese plans to force tech firms trading in China to share encryption keys and put backdoors in software.
- March 05, 2015
05 Mar'15
Mobile World Congress 2015: Evolution but no revolution
Mobile World Congress 2015 reflected less the handset innovation of recent years, and more the evolution of mobility.
- March 05, 2015
05 Mar'15
Jive-n and Jive-x bolstered by new integrations, partnerships
Jive social software is delivering more relevant content to administrators and users with an updated homepage, analytics and integrations.
- March 05, 2015
05 Mar'15
Threat experts warn against compliance-centric security
While regulatory compliance is valuable and necessary for enterprise, cyberthreat experts say that a compliance-centric security strategy may leave organizations with few resources to ward off emerging cyberthreats.
- March 05, 2015
05 Mar'15
Mounting IT concerns spur hybrid cloud growth
According to a recent study conducted by EMC, the top concerns of IT managers today could be contributing to an uptick in hybrid cloud deployments.
- March 05, 2015
05 Mar'15
Microsoft: FREAK vulnerability does affect Windows
The serious HTTPS FREAK exploit was thought to only affect Android, iOS, and MacOS, but Microsoft has confirmed that it also affects all supported versions of Windows.
- March 04, 2015
04 Mar'15
US policy exposes Apple and Google devices to Freak attack
An old US policy requiring weaker encryption for export products is exposing millions of Apple and Google devices, say researchers.
- March 04, 2015
04 Mar'15
Alibaba emerges as AWS challenger after US data center opening
Chinese Internet giant outlines US data center plans as it prepares for cloud battle with AWS, Microsoft and Google.
- March 04, 2015
04 Mar'15
Aruba controllers combine WAN optimization, security in one box
New Aruba controllers for the branch office provide WLAN management, WAN intelligence and a firewall in one appliance.
- March 04, 2015
04 Mar'15
BlackBerry adds BES12 Cloud, new phone, productivity suite
BlackBerry finally brought its flagship BES12 EMM service to the cloud, along with a productivity suite and a new touchscreen phone for diehard users.
- March 04, 2015
04 Mar'15
Cisco, VMware launch CSP products at MWC
CSP products introduced at the Mobile World Congress included cloud-based analytics from Cisco and virtualized networking technology from VMware.
- March 04, 2015
04 Mar'15
NoSQL database security has room to mature
NoSQL database security has taken a backseat to performance in Hadoop-based security big data analytics systems, but that may soon change thanks to growing demand and maturing NoSQL security products.
- March 04, 2015
04 Mar'15
SanDisk InfiniFlash system joins all-flash array game
SanDisk launched the InfiniFlash all-flash platform this week. The system is said to deliver flash storage for less than $2 per GB before data reduction.
- March 04, 2015
04 Mar'15
Former Sears CISO talks up security big data
Demetrios Lazarikos describes the security big data system he implemented at retail giant Sears, as well as how it helped thwart retail fraud activity and how he convinced executives to support the implementation.
- March 04, 2015
04 Mar'15
Internet of Things can boost healthcare experience
From improving customer experience to connecting medical devices to physicians' smartphones, the Internet of Things is steadily colonizing healthcare.
- March 03, 2015
03 Mar'15
Google hints at starting its own mobile network
Frustrated by the lack of innovation in the mobile broadband space. the search giant has hinted that it might show the big boys how it’s done... Google-style.
- March 03, 2015
03 Mar'15
AT&T, Microsoft offer mobile office suite for SMBs
AT&T and Microsoft have launched a mobile office suite for small and medium-sized businesses that includes audio calls, video conferencing, Office 365 and tech support.
- March 03, 2015
03 Mar'15
HP's Aruba acquisition a challenge to Cisco
Hewlett-Packard's $2.7 billion Aruba acquisition would bring wireless networking technology expected to make HP a stronger competitor against Cisco.
- March 03, 2015
03 Mar'15
More than a billion smartphones sold in 2014
More than a billion smartphones were sold worldwide in 2014, according to research firm Gartner.
- March 03, 2015
03 Mar'15
HP updates Helion OpenStack in latest hybrid cloud push
Hardware giant follows up earlier open-source cloud pledge with product updates to speed user adoption of hybrid IT.
- March 03, 2015
03 Mar'15
Apple Pay fraud spikes due to lax bank ID checks
Banks are rushing to fix sloppy authentication processes at the heart of rising Apple Pay fraud. Experts also worry about potential fraud with other mobile payment systems.
- March 02, 2015
02 Mar'15
Docker orchestration tools all about scale
A trio of Docker orchestration tools gives users a means to manage at scale and a native alternative to third-party software already filling the void.
- March 02, 2015
02 Mar'15
AWS ElasticSearch may cure integration blues
ElasticSearch is an increasingly popular search engine that can be tricky to integrate onto EC2. AWS plans to solve that with its ElasticSearch service.
- March 02, 2015
02 Mar'15
ExaGrid dedupe adapts, expands in backup appliance market
ExaGrid CEO says the vendor's revenue grew in double digits last year and he expects to become a public company within a few years.
- March 02, 2015
02 Mar'15
US retailer Natural Grocers investigates data breach
Natural Grocers is the latest US retailer to announce it is investigating a possible data breach involving customer payment cards.
- March 02, 2015
02 Mar'15
Wearables provide security opportunities
If the channel was wondering where it could make money out of wearables, then some of the answers are starting to appear at Mobile World Congress.
- March 02, 2015
02 Mar'15
How to use red teaming to find real-world vulnerabilities
Red teaming simulates a cyber criminal attack under controlled conditions to identify risks and the impact on the business.
- March 02, 2015
02 Mar'15
MWC: Brocade buys Connectem to meet core demands of IoT
Brocade buys LTE virtual Evolved Packet Core specialist Connectem to meet demands on mobile networks from the Internet of Things.
- March 02, 2015
02 Mar'15
HP to acquire Aruba Networks
HP scoops up Aruba in a $3B deal, representing its largest acquisition since the Autonomy scandal.
- March 02, 2015
02 Mar'15
AWS Service Catalog expected to ease cloud management
Enterprise IT shops hope the AWS Service Catalog will be a cheaper alternative to third-party tools and solve EC2 tagging issues.
- March 02, 2015
02 Mar'15
Uber database breached, investigation underway
Following the theft of data affecting about 50,000 of its drivers, Uber says it has filed a subpoena to obtain GitHub data that may pinpoint the source of its data breach.
- March 02, 2015
02 Mar'15
SUSE makes bet on Ceph in open source storage
SUSE sets its sights on open source storage, making SUSE Enterprise Storage with Ceph generally available, with an enhanced version to follow in the summer.
- February 27, 2015
27 Feb'15
Cyberattacks top US national threat list
Cyberattacks by politically and criminally motivated actors top the list of threats facing the US, according to national intelligence director.
- February 27, 2015
27 Feb'15
Education needs to look wider for technology solutions
Gartner has advised those responsible for education IT budgets to look for technology that is playing a role in the business world.
- February 27, 2015
27 Feb'15
Big Blue spending big bucks on emerging business
IBM has announced that it's going to pump $4B into cloud, analytics, security, mobile and social in an attempt to plug the hole.
- February 27, 2015
27 Feb'15
Innovation worries rise in Aruba acquisition by HP
If HP acquires Aruba, it may slow the wireless networking company's ability to innovate and lead to a confusing product portfolio, Aruba customer says.
- February 27, 2015
27 Feb'15
Target breach could cost $1bn or more, say security experts
Security experts say the data breach at US retailer Target in late 2013 could cost way more than the $162m cost declared by the company.
- February 27, 2015
27 Feb'15
Post-adware problems Lenovo promises cleaner and safer PCs
In the light of the problems that Lenovo has suffered with the Superfish adware, the vendor has promised to deliver safer and cleaner PCs in the future.
- February 27, 2015
27 Feb'15
Android for Work simplifies Google mobile management
Google went the container route with Android for Work for enhanced enterprise management, but left out Samsung Knox.
- February 27, 2015
27 Feb'15
Sluggish video hardware revenue spells trouble for legacy vendors
Video hardware revenues are expected to stagnate as video conferencing software grows in popularity. Vendors may be in trouble if they don't adapt to a changing market.
- February 27, 2015
27 Feb'15
Parallels, 2X combo offers low-cost app publishing tool
Parallels acquired 2X Software to add app publishing, but faces a difficult battle with entrenched virtual desktop vendors Citrix and VMware.
- February 27, 2015
27 Feb'15
AWS to reboot EC2 to fix Xen vulnerability
For AWS shops, news of another reboot in the EC2 fleet shows the cloud provider is staying on top of its security responsibilities.
- February 26, 2015
26 Feb'15
Lizard Squad hacks Lenovo's website
The PR nightmare continues as Lenovo.com is hijacked by pesky Lizard Squad.
- February 26, 2015
26 Feb'15
John Chen pushes BES12 as Android for Work platform
BlackBerry may be heading for the breakthrough it needs under the leadership of CEO John Chen with a new Google tie-up.
- February 26, 2015
26 Feb'15
IBM, Juniper offering real-time analytics in partnership
IBM and Juniper say they will work together to deliver customer intelligence to cloud and communications service providers.
- February 26, 2015
26 Feb'15
PernixData revs up RAM caching capability
PernixData Flash Virtualization Platform's latest version compresses data on RAM, and its server-side caching software pools flash and memory resources.
- February 26, 2015
26 Feb'15
Social email tools give users the best of both worlds
Combining collaboration and social features into existing email platforms will encourage adoption, without forcing users to work with standalone tools.
- February 26, 2015
26 Feb'15
New Google scanner validates cloud app security
Google's new cloud security scanner aims to make application vulnerability scanning easier for Google App Engine developers.
- February 26, 2015
26 Feb'15
Connected Data offers new sync-and-share appliances
Connected Data has rolled out two new sync-and-share appliances for businesses that want on-premises secure file sharing.
- February 26, 2015
26 Feb'15
HP: Vetting threat intelligence sources is key
According to HP Security Research, threat intelligence best practices can be difficult to implement, and even the most trustworthy sources must be tested for fidelity.
- February 25, 2015
25 Feb'15
US government offers $3m bounty for banking botnet kingpin
US Department of Justice will give reward for information leading to the arrest of the man accused of being administrator of the GameOver Zeus botnet.
- February 25, 2015
25 Feb'15
Austin, San Francisco and Tel Aviv revealed as top tech cities
Austin, San Francisco and Tel Aviv have been ranked as top cities for tech companies, Savills report reveals.
- February 25, 2015
25 Feb'15
Google ups the ante in mobile wallet war with Apple and Samsung
Google is working with US telcos to boost its mobile wallet amid the fierce challenge from Apple Pay and Samsung.
- February 25, 2015
25 Feb'15
IBM retools MobileFirst Platform
Enterprises can pick and choose which parts of IBM's mobile development and management platform they want to buy and deploy.
- February 25, 2015
25 Feb'15
Midokura ups game against VMware in virtual networking
Midokura has refreshed MidoNet with features that provide a bridge for VMware customers looking to move to OpenStack without using proprietary virtual networking technology.
- February 24, 2015
24 Feb'15
PrivDog SSL compromise potentially worse than Superfish
Some versions of PrivDog software designed to block online ads compromise internet security in a similar way to Superfish.
- February 24, 2015
24 Feb'15
Disruptive cyberattacks set to spur defense plans, says Gartner
By 2018, 40% of organizations will have plans to address cyber-security business disruption attacks, up from 0% in 2015, says Gartner.
- February 24, 2015
24 Feb'15
ONC commits $28 million toward interoperability
A funding opportunity from the ONC and HHS will give out $28 million in awards, spread out among as many as 12 state HIEs.
- February 24, 2015
24 Feb'15
Dell adds Nutanix-powered XC630 and XC730 hyperconverged systems
Dell targets range of use cases with XC630 and XC730 Nutanix-powered server/storage nodes.
- February 24, 2015
24 Feb'15
IoT and phablets set to dominate MWC
With just a few days to go before Mobile World Congress the predictions of what to expect are already stacking up.
- February 24, 2015
24 Feb'15
Avaya's new open SDN architecture spans data center, IoT
Avaya says its SDN architecture leverages OpenDaylight, OpenStack and OpenFlow to deliver programmable network services faster than competing technologies.
- February 24, 2015
24 Feb'15
NetApp adds AWS cloud options
Upgraded appliances and a new release of Cloud OnTap target customers who want to run NetApp storage in Amazon public clouds.
- February 24, 2015
24 Feb'15
Macro viruses making a comeback
Macro viruses haven't been popular since the early 2000s, but recent malware discoveries indicate that macro-infected Word and Excel files are on the rise.
- February 24, 2015
24 Feb'15
Scale Computing targets VM replication with HyperCore 6
The latest iteration of Scale's hyper-convergence enhances cloning with block-level replication of VMs for failover and failback across clustered nodes.
- February 23, 2015
23 Feb'15
ONC sets timeline for national interoperability
The ONC published a draft of its interoperability plan that delineates stages and targets for healthcare professionals to hit over the next decade.
- February 23, 2015
23 Feb'15
AWS shops eye Azure Machine Learning
What does Microsoft have that AWS doesn't? Better-integrated machine learning resources for business intelligence apps.
- February 23, 2015
23 Feb'15
Growing OpenAppID can help spot app traffic
On its one-year anniversary, use of Cisco's OpenAppID application-layer traffic-detection tool is still modest compared to Snort, but the networking giant says it can help enterprises improve internal application traffic visibility.
- February 23, 2015
23 Feb'15
Lenovo faces lawsuit for pre-installing Superfish adware
A class action lawsuit has been filed against Lenovo after it was found to have pre-installed adware vulnerable to cyberattacks.
- February 23, 2015
23 Feb'15
Security top driver for implementing ISO 27001, study shows
Information security is the biggest driver for companies to apply for certification in compliance with the ISO 27001 standard, a global survey shows.
- February 23, 2015
23 Feb'15
Lenovo releases fix for Superfish
Mixed messages coming from Lenovo as follow up statement loosely acknowledges that Superfish may have security implications.
- February 23, 2015
23 Feb'15
Vendor: DMARC needed to curb malicious emailers
A new study finds that enterprises, especially healthcare companies, are slow to adopt the DMARC email authentication standard, making them vulnerable to malicious emailers.
- February 23, 2015
23 Feb'15
IBM switches flash modules for new FlashSystem, bundles software
IBM readies first-quarter update of FlashSystem storage arrays with denser MLC-based flash and integrated compression, virtualization and management.
- February 20, 2015
20 Feb'15
Berners-Lee foundation calls for steps to secure mobile comms
Tim Berners-Lee's World Wide Web Foundation has called for urgent steps to secure mobile communications.
- February 20, 2015
20 Feb'15
BlackBerry 10.3.1 review: Access Android apps and Blend
BlackBerry has finally released version 10.3.1 of its mobile operating system, which gives access to the Amazon Android app store.
- February 20, 2015
20 Feb'15
Outlook app security, Office cloud partnerships added
Although Microsoft added some PIN-level improvements to its Outlook mobile apps, addressing bigger-picture issues may take time.
- February 20, 2015
20 Feb'15
Gemalto denies knowledge of GCHQ and NSA Sim card hack
Gemalto says it cannot verify a report that it was hacked by the NSA and GCHQ to steal encryption keys.
- February 20, 2015
20 Feb'15
US set for trial of extradited Russian hacker suspect
The US is set for the trial of alleged Russian cyber criminal Vladimir Drinkman after he was extradited from the Netherlands.
- February 19, 2015
19 Feb'15
Alternative Android browsers contain dangerous flaws
Exclusive: VerSprite research on 10 alternative Android browsers has found at least one major security vulnerability in all of them, posing a significant security risk for enterprise Android users.
- February 19, 2015
19 Feb'15
PernixData FVP boosts RAM host storage with compression
Flash caching firm PernixData adds compression to FVP 2.5 for more scope to use RAM as host-based storage for high performance datasets.
- February 19, 2015
19 Feb'15
FalconStor launches FreeStor storage virtualization
FreeStor integrates FalconStor point products in a software-defined platform with pricing based on consumed storage.
- February 19, 2015
19 Feb'15
Extrahop delivers real-time analytics at 40 Gbps
ExtraHop's latest monitoring appliance, the EH9100, provides wire data analytics over 40 Gigabits per second in a single box.
- February 19, 2015
19 Feb'15
4G to reach 2.4 billion people by end of 2015
A third of the global population will be covered by 4G networks by the end of 2015, according to a GSMA report.
- February 19, 2015
19 Feb'15
Lenovo caught shipping laptops with adware
Lenovo has been forced to respond after it was revealed that it was shipping consumer laptops with preinstalled adware.
- February 19, 2015
19 Feb'15
Social engineering techniques businesses need to know about
An Intel Security report encourages businesses to address and educate employees on “six levers of influence” used by hackers.
- February 19, 2015
19 Feb'15
SDN supplier Big Switch launches free online test environment
Big Switch Networks launches online development and test environment to show how to set up and run a software-defined network (SDN).
- February 19, 2015
19 Feb'15
IBM makes XIV software-only, places it under new Spectrum brand
IBM pledges $1 billion to build out its cloud storage services and software-defined storage portfolio while rebranding its storage software as Spectrum.
- February 19, 2015
19 Feb'15
HP Ethernet switch line with Cumulus OS aimed at cloud providers
Hewlett-Packard joins Dell and Juniper Networks by launching a line of switching gear that runs on open operating systems. The HP Ethernet switch will be available in late March.
- February 19, 2015
19 Feb'15
Kony goes codeless with simpler MADP option
Analysts see a trend to codeless apps with more processes going mobile and vendors like Kony keeping in lock-step with Modeler.
- February 18, 2015
18 Feb'15
Kaspersky reveals Arabic-speaking international cyber mercenaries
A cyber espionage group is targeting thousands of high-profile organizations and individuals in the Middle East and around the globe.
- February 18, 2015
18 Feb'15
Santander data storage: Gimmick or real challenge to IT giants?
Is Spanish bank Santander's offer of data storage just a sideshow to inject confidence in an industry facing increasing competitive tensions?