Buying Slack could give Amazon another enterprise toehold
Amazon is apparently interested in buying Slack Technologies, a move analysts say could allow Amazon to push further into the enterprise.
Amazon is apparently interested in buying Slack Technologies, a move analysts say could allow Amazon to push further into the enterprise.
Popular browsers such as Edge, Firefox and Chrome have lots of features -- and can take up lots of memory. We look at 5 lesser-known browsers for simpler surfing.
When mixing personal and professional tasks on your smartphone, it's inevitable that someone is going to accidentally stumble onto malware. The SANS Institute's Chris Crowley has some advice on how to avoid trouble.
Penetration testing was much like taking a battering ram to the door of the fortress. Keep pounding away and maybe find a secret backdoor to enter through. But what happens if pieces of the network are outside of the fortress? With the flurry of Internet of Things devices, is it harder to conduct a pen test with that many devices and end points?
Retired Gen. Michael Hayden held nothing back when addressing cybersecurity pros at the ZertoCon conference in Boston.
In November of 2015, First National Bank of South Africa received a typical ransom email from the Armada Collective, which was quickly followed by a teaser flood attack that the bank proactively mitigated. Sort of a shot across the bow to make sure the bank knew the criminals were serious.
Learn how to protect yourself in the Cloud from the next vulnerability and/or wide scale attack.
To protect users from public embarrassment their identities have been withheld in these true stories of failures to follow security protocol.
We used 1 million records exposed as our floor in creating this list. Starting with a number that big says a lot about the state of data security.
These disgruntled employees show what can happen when an employer wrongs them.
The retired Microsoft CEO is now ready to ride off into the sunset. But what will he do?
What is the equivalent in technology to Punxsutawney Phil seeing his shadow?
The trial pitting Google vs. Oracle on the claim of intellectual property infringement by Google in Android has reached almost a tabloid like feel. Outside the courtroom feels like the red carpet as tech giant after tech giant emerge from limos and town cars to testify.
It was always thought that as Apple products increased in popularity, so would the target on its back placed by cybercriminals. Always looking to take down the king of the hill, cybercriminals finally got to Apple's Macs last week with a botnet that attacked more than 600,000 machines.
Big Data is the latest industry buzzword. It's just another way of saying you as a network manager are being inundated with data and you better figure out a way to manage, secure and analyze it.