Blue Coat plans email, web sandbox for iPad 
By James Hutchinson | Nov 17, 2011 | Comment Now 
Addresses BYO device market.
 
Trapster.com hacked, leaving millions of smartphone users exposed 
 
Newcrest spends millions on Mincom software 
Aug 14, 2010 | Comment Now 
Part of information systems consolidation project.
 
Avaya touts virtual comms for mid-sized firms 
By David Neal | Oct 13, 2009 | Comment Now 
Aura system cheaper and less complex.
 
IBM develops selective data hiding on the fly 
By Chuck Miller | Jul 10, 2009 | Comment Now 
IBM researchers say they have invented a way to selectively obscure sensitive information before it is displayed on a computer screen.
 
Novell broadens security portfolio 
By Shaun Nichols | Feb 23, 2009 | Comment Now 
Novell today announced two new acquisitions designed to extend its identity and access management capabilities.
 
Novell broadens security portfolio 
By Phil Muncaster | Feb 21, 2009 | Comment Now 
Novell today announced two new acquisitions designed to extend its identity and access management capabilities.
 
US Army spends millions on video games 
By Egan Orion | Nov 26, 2008 | Comment Now 
The U.S. Army plans to spend $50 million on developing video games over the next six years for training soldiers.
 
LinkedIn pulls in millions more in funding 
By Sylvie Barak | Oct 24, 2008 | Comment Now 
Professional social neworking site LinkedIn has announced that it has raised US$22.7 million in additional funding to warm it through the icy financial winter.
 
Enterprises warned on open source security 
By Iain Thomson | Jul 22, 2008 | Comment Now 
A study into eleven popular open source applications has suggested that enterprises are underestimating the security risks of using the code..
 
$20m iPhone injection could boost Aussie adoption of 3G 
By Ashley Clark | Jul 14, 2008 | Comment Now 
Market researcher IbisWorld has predicted that Friday’s launch of the iPhone across Australia delivered $20 million into the economy in just a matter of hours.
 
ATM hackers net millions using stolen information 
By Chuck Miller | Jun 20, 2008 | Comment Now 
A unique breach of bank information has hit one of the world's largest banks.
 
Enterprises embrace Web 2.0 
By Rosalie Marshall | Jun 13, 2008 | Comment Now 
Senior IT leaders have confirmed that so-called Web 2.0 technologies are making huge strides in the enterprise, delivering some game-changing results.
 
Enterprises at risk from email leaks 
By Robert Jaques | May 28, 2008 | Comment Now 
Large enterprises continue to risk leaks from outbound email, blogs, message boards, media sharing sites and mobile devices, according to new research..
 
Viewers take to iPlayer in their millions 
May 22, 2008 | Comment Now 
The BBC's iPlayer service continues to go from strength to strength, logging growth of more than 20 percent between March and April 2008..
 
Enterprises click with social networking 
By Guy Dixon | May 13, 2008 | Comment Now 
The market for enterprise social networking products, such as KickApps, Passenger and hi5, could reach US$2 billion by 2012, according to recent research..
 
Enterprises must ditch silo computing 
By Guy Dixon | Apr 30, 2008 | Comment Now 
Organisations are moving from traditional hierarchies based on command and control to looser structures requiring collaboration and team work, according to a study by research ...
 
Ubuntu clears path to enterprises 
By David Neal | Apr 23, 2008 | Comment Now 
Linux vendor Ubuntu has made two announcements pitching itself firmly in the direction of enterprise open-source computing.
 
Enterprises plug-in to web 2.0 
By Robert Jaques | Apr 22, 2008 | Comment Now 
Enterprise spending on web 2.0 technologies will surge over the next five years, growing 43 percent per year to reach US$4.6 billion globally by 2013, according to a new report ...
 
Workers call for improved search in enterprises 
By Rosalie Marshall | Apr 9, 2008 | Comment Now 
A survey by search vendor Sinqua has revealed that workers feel that their employers are providing them with poor quality tools to use when searching enterprise systems.
1 2 3 4 5 | Next »
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  65%
 
Advanced persistent threats
  5%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1397

Vote