Top CIO priorities for 2015
We are almost two months into 2015 and CIOs are well into their initiatives for this year after their summer breaks. We speak to three IT leaders to find out what their key objectives and initiatives are for 2015.
We are almost two months into 2015 and CIOs are well into their initiatives for this year after their summer breaks. We speak to three IT leaders to find out what their key objectives and initiatives are for 2015.
Hosted service vendor Telco Systems is hoping to make it easier for businesses to buy cloud-based routers and firewalls, but the company first has to convince service providers it's a good idea.
Cisco is bringing technology obtained through last year's acquisition of Sourcefire to its firewalls to enable threat-focused security for enterprises.
It's been 20 years since Check Point Software Technologies shipped its first enterprise network firewall, marking the beginning of a mass market for firewalls that has protected millions of networks across the world.
The number of NTP (Network Time Protocol) servers that can be abused to amplify DDoS attacks has decreased dramatically this year, but the threat remains.
Today is the final Microsoft Patch Tuesday for 2010. It has been a busy year for Microsoft when it comes to security bulletins, and December is no exception as Microsoft closes out the year with a record 17 security bulletins. With only a week or so until many IT admins plan to kiss 2010 goodbye and break for the holidays, it is important to understand and prioritize the latest patches for quick implementation.
SUPERAntiSpyware found three Trojans on a reader's PC. He asked the <a href="http://forums.pcworld.com/index.php?/forum/2000-windows/">Windows</a> forum how this could happen when his PC is protected.
Laptops used to be the only devices on the company's wireless network. But Wi-Fi has become a ubiquitous standard used by a host of devices -- including desktop PCs, laptops, netbooks, tablets, smartphones, printers, storage devices, and projectors.
There are more than a few critics of cloud computing, even at PCWorld; I'm probably one of them. But I've been turning over in my mind different perspectives on the cloud. I've tried to set aside the views of the IT executive, who seems to dominate the debate.
Yet another survey is indicating that security is a big issue for those intending to take up cloud computing.
Data security is always top of mind for CIOs and CSOs, and there is no shortage of challenges when it comes to picking the right tool for the job. With network and software vulnerabilities growing at a perpetual rate, good security software can help defend against many of the large-scale threats that occur locally and from all over the Internet. In this edition of 5 open source things to watch, we take a look at security products that will guard against threats without robbing your kitty.
In recent weeks WikiLeaks has been targeted by denial-of-service (DoS) attacks, had its hosting service shutdown, been bounced off of Amazon hosting, had its funding through PayPal, MasterCard and other sources shut down, and its leader arrested on sexual assault-related charges. The fact that WikiLeaks remains stubbornly and defiantly online holds some lessons for other sites when it comes to resilience and survivability.
With employees and customers increasingly depending on corporate websites, reliability and security have become more critical than ever.