In the latest effort to encourage owners and operators of the nations critical infrastructure to hand over threat and vulnerability data to federal agencies,...
Rootkits are becoming increasingly common on enterprise computer networks and are even being used to create undetectable download servers for pirated movies and MP3s,...
Computer Associates International Inc. is reaching out to small and midsize businesses with a new line of software suites that integrate security, storage and...
Microsoft has confirmed plans to bundle anti-spyware protection into Windows Vista, a move that is sure to raise eyebrows among competitors and possibly antitrust...
With so many retailers and manufacturers embracing RFID tracking throughout the supply chain, there is a strong assumption that an RFID label is still...
Microsoft Corp.s patch for a worm-vulnerable security flaw in the Windows 2000 operating system is causing problems for some users.
The software giant late Friday...
Customer experience (CX) became the top brand differentiator in 2018, outpacing price, product quality and everything else. Businesses that offer a superior and differentiated...
The trickle-down effect of enterprise IT is as old as business technology. Vendors have long aimed new innovations at enterprises whose deep pockets and...