Although two updates to Apple Computer Inc.s Mac OS X Tiger have fixed many compatibility problems, enterprise networking problems persist. A new update, version...
NEW YORK—Speech recognition is becoming widely adopted by business with wildly variable results, but one productive use of the technology is speaker verification—the use...
A security flaw in a search tool used on the Cisco Web portal could potentially compromise registered users passwords, the routing and switching giant...
Microsoft Corp. on Tuesday confirmed it was investigating a new "high risk" vulnerability in the widely used Internet Explorer Web browser.
The software giants acknowledgement...
Along with Cisco Systems Inc., Oracle was a choice whipping boy at last weeks Black Hat USA security conference. Regardless, Oracle users remained nonplussed...
Messaging security software developer Proofpoint has teamed up with Voltage Security to integrate encryption capabilities into its Proofpoint Protection Server software and Messaging Security...
An unsuccessful attempt by Cisco Systems Inc. and Internet Security Systems Inc. to quash discussion of security flaws in Ciscos Internetwork Operating System resulted...
I find it fascinating how differently database administrators react to security alerts depending on the platform they support. There is clearly a caste system...
Flaws have been found in MySQL Eventum 1.5.5 and prior that allow malicious users to conduct cross-site scripting and SQL injection attacks.Eventum is an...
A new beta of the popular Greasemonkey browser extension has been released to fix a well-known—and potentially dangerous—security vulnerability.
The security upgrade comes less than...
Customer experience (CX) became the top brand differentiator in 2018, outpacing price, product quality and everything else. Businesses that offer a superior and differentiated...
The trickle-down effect of enterprise IT is as old as business technology. Vendors have long aimed new innovations at enterprises whose deep pockets and...