The view from the top of IT with TechWorld Editor Rohan Pearce
The New York Times blamed a prolonged website outage on Tuesday on a hacking attack at the company's Australia-based domain name registrar, Melbourne IT.
By Jaikumar Vijayan | 28 August, 2013 00:49
Australian IT security and network operations professionals have cited manual processes and poor visibility of security policies as their biggest challenges according to a new report.
By Hamish Barwick | 27 June, 2013 12:44
The Wi-Fi Alliance unveiled a certification program for 802.11ac Wi-Fi (also known as 5G Wi-Fi) designed to make sure devices using the wireless technology interoperate with older hardware.
By Matt Hamblen | 19 June, 2013 10:16
Plugging network security leaks is an essential responsibility for companies, private organizations and technology professionals. Achieving that goal requires discovery tools that scour every asset, including those not currently under management, and also map connectivity between institutions involved with an organization's sensitive information around IT compliance, corporate security, product development, critical infrastructure protection and other relevant issues.
By Michael Markulec, president and chief technology officer, Lumeta | 03 June, 2013 21:27
Today is the final Microsoft Patch Tuesday for 2010. It has been a busy year for Microsoft when it comes to security bulletins, and December is no exception as Microsoft closes out the year with a record 17 security bulletins. With only a week or so until many IT admins plan to kiss 2010 goodbye and break for the holidays, it is important to understand and prioritize the latest patches for quick implementation.
By Tony Bradley | 15 December, 2010 07:13
Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users
By Roger A. Grimes | 30 September, 2013 10:05
Laptops used to be the only devices on the company's wireless network. But Wi-Fi has become a ubiquitous standard used by a host of devices -- including desktop PCs, laptops, netbooks, tablets, smartphones, printers, storage devices, and projectors.
By Logan G. Harbaugh | 27 October, 2011 08:27
There are more than a few critics of cloud computing, even at PCWorld; I'm probably one of them. But I've been turning over in my mind different perspectives on the cloud. I've tried to set aside the views of the IT executive, who seems to dominate the debate.
By Keir Thomas | 05 February, 2011 11:53
For enterprise IT security organizations, the evolution of applications and threats, coupled with the stagnation of traditional network security technology has resulted in a loss of visibility and control. This paper examines three different organizations, the legacy infrastructure they replaced, the firewalls they deployed and the subsequent savings.