Despite the recent emergence of anti-phishing legislation, IT managers and consumers would be foolish not to continue implementing their own stringent technology measures against...
In the latest effort to encourage owners and operators of the nations critical infrastructure to hand over threat and vulnerability data to federal agencies,...
Rootkits are becoming increasingly common on enterprise computer networks and are even being used to create undetectable download servers for pirated movies and MP3s,...
Computer Associates International Inc. is reaching out to small and midsize businesses with a new line of software suites that integrate security, storage and...
WALTHAM, Mass.—Information technology is playing a greater role than ever before in aiding older generations to stay informed, expand their professional skills and share...
A month after introducing its new UltraSPARC IV+ processor in its low-end and midrange Sun Fire servers, Sun Microsystems Inc. on Monday will announce...
Customer experience (CX) became the top brand differentiator in 2018, outpacing price, product quality and everything else. Businesses that offer a superior and differentiated...
The trickle-down effect of enterprise IT is as old as business technology. Vendors have long aimed new innovations at enterprises whose deep pockets and...