The modern attack surface has grown too large and complex for security professionals to manage using traditional, manual approaches to the asset lifecycle.

Linux entered the world of technology with little more than a kernel to call its own. That was the intent of a young computer science student from Helsinki named Linus Torvalds in doing this personal fun project. In 1991, he created code that would become the basis for a completely new approach to o...

Open source software is now the foundation for the vast majority of applications across all industries, however many of those industries are struggling to manage open source risk. Organizations, regardless of industry, must do a better job maintaining open source components given their critical natu...

Jeff Bezos last week announced he will be stepping down from his role of CEO Amazon. Bezos is following Microsoft's lead and putting his cloud executive Andy Jassy in charge of the company. Given that Microsoft was exceedingly successful with putting Satya Nadella in the same role, it would seem tha...

Downtime can cost enterprises that depend solely on a data center's ability to deliver IT and networking services to customers -- such as e-commerce companies -- up to $11,000 a minute. The cost to businesses, entrepreneurs and individuals who use subscription services in their work has yet to be ca...

More than 90 percent of IT leaders surveyed for a recent report expect to expand their cloud services in the next one to three years. Despite this testament to the benefits of cloud adoption, enterprises may find a lack of qualified IT workers to fill those positions. A majority of cloud team leader...

As the next step in its Linux expansion program, Lenovo has launched Linux-ready ThinkPad and ThinkStation PCs pre-installed with Canonical's Ubuntu technology. The company also now brings Linux certification to its ThinkPad and ThinkStation Workstation portfolio, along with easing deployment for d...

With hurricane season in full bloom and the additional prospect of natural disasters, the importance for companies to have disaster data plans in place is paramount. TechNewsWorld discussed disaster preparedness with a panel of IT experts. Check out their recommendations -- and make sure that you ha...

Counterfeit hardware, especially in corporate settings, is a recurring problem that often goes unnoticed. Having such gear online poses serious financial, operational, and security risks. Cybersecurity company F-Secure has released an investigative report detailing counterfeit Cisco Catalyst 2960-X...

When shopping for cable/satellite TV or streaming services, what are your top three determiners?
Loading ... Loading ...