Search Results:
46-60 of 8298 results

How Quip makes ‘Excel’ collaborative

The productivity tool’s new feature lets you integrate spreadsheets into word documents.

Unified Communications

Published 09 October 2014

Half of online Europeans had personal data stolen

Company errors, not hackers, responsible for almost 60% of breaches.

Security

Published 09 October 2014

Shellshock bug hits Siemens industrial products

Hackers can remotely execute code and escalate privilege in select software.

Security

Published 09 October 2014

EU and China near telecoms trade dispute settlement

Agreement will prove beneficial to both.

Telecoms

Published 09 October 2014

DDoS hackers move to new protocol in Q3

Report spotted 30,000 attacks on Simple Service Discovery Protocol.

Security

Published 08 October 2014

UK firms struggle to grasp software defined networking

Barriers to SDN adoption remain.

Networking

Published 08 October 2014

Sophos buys mobile security firm Mojave

Oxford based security company expands further into US and cloud.

Security

Published 08 October 2014

Phishers use phoney LinkedIn profiles

Victims lured into scam with offer of sharing $27m.

Security

Published 08 October 2014

Windows XP linked to 500,000 machine botnet

Russian cybercriminals are have sniffed 800,000 banking transactions.

Security

Published 07 October 2014

Malware hits cash point infrastucture

Hackers forced to move on from card skimming and attack firms directly.

Security

Published 07 October 2014

Yahoo hacked, but not through Shellshock

Security researcher said search engine was targeted by Romanian gang.

Security

Published 07 October 2014

Hewlett-Packard Enterprise versus IBM Enterprise

A very high level comparison

Published 06 October 2014

Windows afflicted by Shellshock-esque bug

Users able to control server by renaming directory.

Security

Published 06 October 2014

Anonymous claims hacks on Chinese websites

Hacktivists tells Hong Kong police to stop ‘inhumane actions’ against citizens.

Security

Published 06 October 2014

JP Morgan hackers hit 10 financial groups

Customers of largest US bank rally in wake of attack.

Security

Published 06 October 2014

46-60 of 8298 results

Join our network

755 people like this.
0 people follow this.

CBR Supplier Recommendations

See more

CBR White Paper Recommendations

  • 10 reasons to deploy WAN optimization in an economic downturn

    03 November 2010 | By Teneo

    It’s no secret that companies often look to cut IT budgets in times of economic difficulty. But as McKinsey Consulting recently reported, it doesn’t make sense to do across the board IT budget cuts. Instead, the business should still make targeted investments that actually cut costs and prepare for the future. CIOs who take this advice to heart can present their board a strategy that delivers savings today and greater opportunity in the future. Why wait? Putting off the deployment of WAN optimization means savings and opportunity lost for the business....

    White Papers
  • Extreme savings: cutting costs with wide-area data services

    03 November 2010 | By Teneo

    Organizations of all sizes strive to be more productive and run low cost operations. Particularly in difficult economic times, many organizations will evaluate various cost-cutting initiatives in order to weather the storm. Ideally, organizations should not make deep cuts in investments that may jeopardize future growth, such as product improvements or hiring of key personnel.This paper explores how enterprises can use Riverbed solutions to cut hard costs and make the most of their existing infrastructure, without negatively impacting their operations....

    White Papers
See more
Privcy Policy

We have updated our privacy policy. In the latest update it explains what cookies are and how we use them on our site. To learn more about cookies and their benefits, please view our privacy policy. Please be aware that parts of this site will not function correctly if you disable cookies. By continuing to use this site, you consent to our use of cookies in accordance with our privacy policy unless you have disabled them.