New Avaya device takes on Cisco (Apple, too) in tablet war
Avaya is introducing a powerful Android-based touchscreen tablet that supports new communications software in a package to rival Cisco's recently announced Cius communications tablet.
Avaya is introducing a powerful Android-based touchscreen tablet that supports new communications software in a package to rival Cisco's recently announced Cius communications tablet.
NEW YORK -- A CISO who spent two years organizing identity and access management for the 15,000 users on his network boiled the whole experience down into a 10-step process he presented at the Security Standard Conference this week.
Government needs to better understand the realities of running profitable businesses -- and quickly -- as it imposes security regulations that can affect the profitability of corporations battling in a competitive environment.
The first wave of the "Here you have" virus seems to have run its course with removal of the malicious file from the site from which it was being downloaded, but keep an eye out for follow-up versions.
Check Point's Security Gateway software is now available in a virtual edition that is compatible with VMware virtual environments.
Blue Coat Systems has brought in a new CEO, spinning the change as a way to free up outgoing boss Brian Nesmith from the daily grind of managing the company to instead work on product strategy.
Skype has launched a Session Initiation Protocol-based voice service for businesses that integrates free and low-cost calling into corporate IP PBXs, providing an opportunity to add voice features to corporate Web sites and to cut back on some phone expenses.
The most significant breach of U.S. military computers ever was carried out in 2008 by W32.SillyFDC, a low-level-threat worm that got into the network via a thumb drive plugged into a military laptop.
The U.S. military wants to exert more influence over the protection of power grids, transportation networks and financial network systems, a Pentagon official says in a broad-ranging essay published in Foreign Affairs.
iPhones and other handhelds bought for home use are infiltrating corporate networks, but there's a host of other wireless technologies that comprise a wave of mobile computing that is creating sweeping changes in business infrastructure. How well versed are you in the technical and not-so- technical details? Keep score as you take this brief quiz to find out and then see how well you did at the end.
Information security is a tough field to break into and a growing group of information security professionals are finding that it's a whole lot easier if someone has their backs.
Hacked smartphones could endanger troops by sending location data to the enemy using mechanisms similar to those employed by recently discovered Android malware, experts say.
Skype is worried about whether the iPhone and other Apple products will undermine its VoIP services and is also insecure about whether it can achieve service levels good enough to lure business customers, according to the company's filing with the U.S. Securities and Exchange Commission in preparation to offering public stock for the first time.
Once thought to be unhackable, the Android phone is anything but, according to researchers presenting at Black Hat 2010.
All the most commonly used Internet browsers are vulnerable to exploits that can force them to cough up users' personal information that can be used to hack into bank accounts or set them up for other attacks, the Black Hat 2010 conference will be told this week.