News & Analysis
Check Point software claims that mobile apps were being used in one of the largest ever malware campaigns on Google Play.
Specialized cloud enables enterprises to run a supply chain with confidence with the business intelligence required to meet customer expectations on delivery time, cost and convenience.
Human-centric cloud security solution for web, email and cloud-access security brokers provides reporting and context to address biggest risks--internal and external.
The ruggedized Toughbook CF-33 has a 3:2 aspect ratio display for less scrolling and more on-screen information for users in one glance.
DAILY VIDEO: Red Hat Enterprise Linux 7.4 set to improve security features; Google, IBM, Lyft collaborate on Istio open microservices technology; Infosys harnessing 'purposeful AI' to aid digital transformations; and there's more.
Expanded functionality in DevOps platform runs and automates applications directly in Amazon Web Services.
Power BI customers can now get insights into the Office 365 usage habits of their workforces, data they can use to rally power users behind their digital transformation initiatives.
A10 Networks Application Intelligence Report (AIR) reveals insights about how much individuals value their mobile applications and their smartphones.
Supervisory Control and Data Acquisition (SCADA) systems are a core element of modern infrastructure and like all forms of technology are at risk from security vulnerabilities.