dcsimg
eWEEK - Enterprise IT Technology News, Opinion and Reviews
  • Register
  • Login
  • eWEEK Account Options
    • Complete My Registration
    • Log out
  • eWEEK Account Options
    • Complete My Registration
  • eWEEK Account Options
    • Complete My Registration
    • Log out
  • eWEEK Account Options
    • My Account
    • My Subscriptions
    • Log out
  • eWEEK Account Options
    • My Account
    • My Subscriptions
    • Log out
  • eWEEK RSS feed
  • eWEEK Twitter
  • eWEEK Facebook
  • eWEEK LinkedIn
  • eWEEK Google Plus
  • eWEEK YouTube Channel
  • Big Data and Analytics
    RSA.tokens.Ducharme
    RSA Identity Products Chief: Why Authentication Should...
    • Pivotal Software Takes Its PaaS Public on NYSE
    • Insightly Releases a Much More Customizable CRM
    • India's HCL Technologies, Equity Firm Acquire Database...
    • IT Science Case Study: How to Get Real-Time Risk Assessments
    • Zuckerberg Holds His Own Against Senators' Barrage...
    • SWIM.AI Emerges From Stealth With Edge Neural Network...
  • Cloud
    Azure Serverless Containers
    Microsoft Tunes Azure Container Instances for Serverless...
    • Gmail Update Helps Protect Businesses from Phishing,...
    • Google Redesigns Gmail With New Security, Productivity...
    • Juniper Aims to Make Multicloud Management Easier
    • Denmark’s Saxo Bank Moving Fintech Stack to Microsoft...
    • Microsoft Expands Its Industrial Internet of Things...
    • Microsoft Azure Service Fabric Welcomes Red Hat Linux...
  • Mobile
    • Apple
    • Upfront Blog
    • Android
    ZTE Export Ban
    US Export Ban Leaves ZTE Fighting for Survival in Mobile...
    • RSA Identity Products Chief: Why Authentication Should...
    • Sony Adds Premium Smartphone to Flagship Xperia XZ2...
    • Microsoft Translator Uses AI to Break Language Barriers...
    • Sony Unveils Larger, Faster Xperia XZ2 Premium Smartphone
    • Sony Xperia XZ2 Premium Features Place It Among Top-Ranked...
  • Networking
    ICS Security Threats
    Concern Rises About Cyber-Attacks Physically Damaging...
    • IBM and IFTTT Bring Together AI and Automation for...
    • Seven Keys to Unleashing the Full Potential of an SD-WAN...
    • Cilium 1.0 Advances Container Networking With Improved...
    • RSA 2018: Cisco's Jeff Reed Explains Security Strategy
    • U.S. UK Government Say Russia Increasing Infrastructure...
    • U.S. Bans Exports to ZTE Crippling Company’s Ability...
  • Security
    • Security Watch Blog
    ICS Security Threats
    Concern Rises About Cyber-Attacks Physically Damaging...
    • Onapsis Reveals 13-Year-Old Configuration Vulnerability...
    • Apple iOS 11.3.1 Fixes QR Code Security Flaw
    • Researchers Find Amazon Alexa Can Be Hacked to Record...
    • 10 Password Managers to Keep Credentials Out of Hackers...
    • IBM Security CTO Details How Cyber-Security Fits Into...
  • Servers
    Windows Server
    Microsoft Expands High Availability Options in Windows...
    • Microsoft Wants to Make It Easier to Upgrade to Windows...
    • Dell EMC, Fujitsu Put Intel FPGAs in Servers to Accelerate...
    • TidalScale Updates Its Software-Defined, Composable...
    • New Nvidia Chips Enable Big Leap in Deep Learning,...
    • Staffing Shortages Threaten to Impair Mainframe App...
    • Microsoft Releases Windows Server 2019 Test Build
  • Storage
    • Storage Station Blog
    Scality.logo
    Object Storage Provider Scality Banks $60 Million in...
    • Storage Array Maker Infinidat Launches Cloud Data Protection
    • TidalScale Updates Its Software-Defined, Composable...
    • Worldwide Converged Systems Saw 9 Percent Revenue Increase...
    • Startup JetStream Promises Painless Cross-Cloud Workload...
    • Why Backing Up Files Now Can Save Major Headaches Later
  • Virtualization
    Tom Corn SVP and GM Security VMware
    How VMware Aims to Give Defenders Home Court Advantage
    • Docker Enterprise Edition 2.0 Launches With Secured...
    • Researchers Show Docker Containers at Risk for Crypto-Currency...
    • Google Introduces New High Performance VM Option for...
    • Cisco Adds Support for Microsoft Hyper-V, Containers...
    • IBM Outlines Prospects for Java in 2018
    • Microsoft's AI-Powered Drawing Bot Turns Text into...
  • Innovation
    RSA.tokens.Ducharme
    RSA Identity Products Chief: Why Authentication Should...
    • Sophos Study Uncovers ‘Dirty Secrets’ of Firewalls
    • India's HCL Technologies, Equity Firm Acquire Database...
    • IT Science Case Study: How to Get Real-Time Risk Assessments
    • #eWEEKchat April 11: Personal Information: Is Anything...
    • IT Science Case Study: Automating Strategic Alliances...
    • Spoke Takes Internal Ticketing Systems to New Level...
  • More
    • Enterprise Apps
    • Android
    • Apple
    • IT Management
    • Small Business
    • Development
    • PC Hardware
    • Database
    • Search Engines
eWeek - Enterprise IT Technology News, Opinion and Reviews
  • Register
  • Login
  • Username
  • Complete My Registration
  • Log out
  • Username
  • Complete My Registration
  • Username
  • Complete My Registration
  • Log out

Username

  • My Account
  • My Subscriptions
  • Log out

Username

  • My Account
  • My Subscriptions
  • Log out
  • Big Data and Analytics
  • Cloud
  • Mobile
    • Apple
    • Upfront Blog
    • Android
  • Networking
  • Security
    • Security Watch Blog
  • Servers
  • Storage
    • Storage Station Blog
  • Virtualization
  • Innovation
  • More
    • Enterprise Apps
    • Android
    • Apple
    • IT Management
    • Small Business
    • Development
    • PC Hardware
    • Database
    • Search Engines
  • News & Analysis
  • Videos
  • Slideshows
  • Blogs
  • White Papers & Webcasts
  • Sponsored Content
  • My eWEEK
Log in
Don't have an Account? Sign up now
Don't have an Account? Sign up now
Don't have an Account? Sign up now
Forgot Your Password?
     
Create a new Account
Complete your registration.
Already have an Account? Click here
You're currently subscribed to some eWEEK features and just need to create a username and password.

     
 
Would you like to link your Social account to eWEEK?
eWeek - Enterprise IT Technology News, Opinion and Reviews
You already have an accounta social account with us.
Link your accounts to manage all your info in one place.
No Thanks, I will login with my current social account
     
 
Would you like to link your Social account to eWEEK?
eWeek - Enterprise IT Technology News, Opinion and Reviews
Linking your Social and eWEEK accounts makes it easier to manage your profile and subscriptions, all in one place.
No Thanks
     
 
We need just a little more information ...
eWeek - Enterprise IT Technology News, Opinion and Reviews
Please provide the following information to complete your registration.
     
 
Sign Me Up
Complete your registration to get access to all of eWEEK's great content and community features.
Already Registered? Click here

By submitting your wireless number, you agree that eWEEK, its related properties, and vendor partners providing content you view may contact you using contact center technology. Your consent is not required to view content or use site features.

By clicking on the "Register" button below, I agree that I have carefully read the Terms of Service and the Privacy Policy and I agree to be legally bound by all such terms.

Continue without consent
     
 
  • Home

data breach

Security Security
Daily Tech Briefing 317

U.S. Indicts Russian Intelligence Officers in 2014 Yahoo Breach VIDEO

eWEEK Staff | March 17, 2017
DAILY VIDEO: DOJ Charges Russian intelligence officers in 2014 Yahoo hack; Third-party Twitter app hacked by Turkish activists to post messages; Intel now major player in driverless cars with Mobileye buy; and there's more.
Security Security
DTB March 7 2017

IBM Enhances Publicly Accessible Quantum Computing Services VIDEO

eWEEK Staff | March 07, 2017
DAILY VIDEO: IBM expands quantum computing efforts; Researchers find 132 malware-infected Android apps on Google Play; Yahoo reveals cookie forging activity led to account breach; and there's more.
Security Security
IT Security

E&Y Survey Find Enterprises Lack Confidence in Cyber-Security Efforts SLIDESHOW

Sean Michael Kerner | December 20, 2016
Security professionals have a tough job, tasked as they are with keeping hackers out and limiting the chances of data breaches. But results of the 19th annual Ernst & Young Global Information Security Survey study, released Dec. 14, show their efforts may not be enough. Ernst & Young interviewed...
Security Security
Daily Briefing 1216B

Yahoo Confirms Another Hack Affecting 1 Billion Users VIDEO

eWEEK Staff | December 16, 2016
DAILY VIDEO: Yahoo suffers new hack; 1 Billion users impacted this time; Uber starts up self-driving car service in San Francisco; Google spins out autonomous vehicle unit into independent company; and there's more.
Security Security
Security vulnerabilities

How to Stop Worrying About Hackers and Start Protecting Data Assets SLIDESHOW

Chris Preimesberger | November 18, 2016
No matter what the size or scope of your company, in which industry you operate or how many resources you have at your disposal, you have something in common with every other organization on today's market. Your business data is in danger. Security threats are becoming more intelligent and...
Security Security
Daily Briefing1114

SEC Filing Indicates Yahoo Was Aware of Massive Data Breach in 2014 VIDEO

eWEEK Staff | November 14, 2016
DAILY VIDEO: SEC filing indicates Yahoo might have known about data breach in 2014; Windows 10 Sticky Notes grow more insightful in more languages; Google to flag repeat offenders of website safety standards; and there's more.
Security Security
Yahoo Data Breach 2

SEC Filing Indicates Yahoo Might Have Known About Data Breach in 2014

Sean Michael Kerner | November 11, 2016
NEWS ANALYSIS: A new Security and Exchange Commission filing suggests that Yahoo may have actually known about a massive data breach that it first publicly acknowledged on Sept. 22 as much as two years earlier.
Security Security
eweek video 10.25.16

How the Internet Survived Massive DNS Attack VIDEO

eWEEK Staff | October 25, 2016
DAILY VIDEO: Why a massive DNS attack didn't shut down the internet; the LinkedIn hacking suspect is also implicated in the 2012 Dropbox breach; Dell is looking to VR, AR and voice to help drive future PC sales; and there's more.
Security Security
LinkedIn, Dropbox hacks

LinkedIn Hacking Suspect Also Implicated in 2012 Dropbox Breach

Sean Michael Kerner | October 24, 2016
The DOJ unseals its indictment against Yevgeniy Nikulin, alleging that the 2012 breaches of LinkedIn and Dropbox were related.
Security Security
LinkedIn hack

Czech Police Apprehend Alleged LinkedIn Hacker

Sean Michael Kerner | October 20, 2016
Four years after a massive data breach of LinkedIn, an Interpol Red Notice alert helps Czech police grab a suspect.
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • …
  • 23
Subscribe to
eWEEK Editor's Pick
Or Log in
Click for more newsletters
We ran into a problem
We already have your email address on file. Please use the "Forgot your password?" link to create a password, validate your email and login.
Forgot password? | Create New Account
We ran into a problem
We already have your email address on file as a Social Account. Please log in with your current Social Account or click "Forgot your password?" to validate your email and login.
Forgot password? | Create New Account
We ran into a problem
We already have an account with that email address. Please log in to edit your information.
Forgot password? | Create New Account
Welcome back!
You're currently subscribed to some eWEEK features and just need to create a username and password to complete your registration and sign up for our eWEEK Editor's Pick newsletter.
Thanks for subscribing!
To complete your registration, create a username and password for My eWEEK:
Are you sure you want to change the email address we have on record for you?
Confirm | Cancel
Welcome back!
You're currently subscribed to some eWEEK features, but just need to complete your registration to enjoy our full range of site personalization and great email newsletters.
Go >
Welcome back!
Personalize your eWEEK experience by following topics that interest you. You'll see relevant content on your My eWEEK page.
See all personalization options >
Latest in My eWEEK
Go to My eWEEK >

Enterprise Tech Videos

  • Featured
  • Sponsored
Daily Tech Briefing April 26, 2018

Dell Builds Latest PCs to Handle Modern Workloads

DAILY VIDEO: Dell eyes AI and security with its latest mobile and desktop business PCs, and Microsoft expands its industrial internet of things cloud portfolio.

  • Onapsis CTO
    SAP at Risk From Configuration Flaw
  • Daily Tech Briefing April 25, 2018
    Cisco Merges Spark, WebEx Collaboration Platforms
View all

Intel Processors, Storage Set New Dell Servers Apart

Dell’s latest Intel-based PowerEdge servers bring new levels of operational efficiency and flexibility while extending industry-leading reliability and uptime.

Sponsored by
  • Dell PowerEdge T630: Versatility for ROBO
  • Dell PowerEdge R730xd: Storage Density for Clouds
View all
Trending
laptops
Apple
iPhone X
Fedora
COBOL
Linux
1088_Fedora28GNOME
Fedora 28 to Deliver New GNOME Linux Desktop
Why COBOL Still Plays a Critical Enterprise Role
New HP ZBook Laptops Built, Priced for Power Users

eWEEK - Enterprise IT Technology News, Opinion and Reviews

Contact Us | About eWeek | Sitemap
  • eWEEK RSS feed
  • eWEEK Twitter
  • eWEEK Facebook
  • eWEEK LinkedIn
  • eWEEK Google Plus
  • eWEEK YouTube Channel
Property of QuinStreet Enterprise.
Terms of Service | Licensing & Reprints | Privacy Policy | Advertise

Copyright 2018 QuinStreet Inc. All Rights Reserved
Rocket Fuel