Samy Kamkar found a weakness in the algorithm American Express uses to generate replacement card information and created a credit card hack as a proof-of-concept.
The latest version of Google's mobile operating system addresses some key enterprise security concerns. Expert Michael Cobb explains what's new in Android M.
The NIST has changed its recommendations on random number generation for cryptographic keys. Expert Michael Cobb outlines the changes and explains why they were made.
The acquisition of automation platform Ansible and a partnership to run its services on Microsoft Azure highlight a busy month of bolstering for the Red Hat cloud strategy.
Joyent bet big on containers to compete in the cloud market, and the company's CTO Bryan Cantrill has plenty to say about the state of containers and what needs to change.
Despite lingering concerns around compliance and lock-in, IT pros are deploying cloud storage services for a range of applications and use cases.
While technically comparable to bare metal cloud offerings from IBM and Rackspace, AWS has a different motivation for offering dedicated hardware.
Amazon quietly made an update to its free AWS cost analysis tool that may be significant enough to give cloud users reason to ditch third-party tools that can cost thousands of dollars.
Managing the gamut of AWS products from end to end requires skilled hands, and IT teams can struggle. Managed service providers apply their cloud knowledge at the behest of the business.
Using a multi-cloud deployment model can help servers stay secure if used in consistent methods.
Having a middleware governance process is critical in industries like finance that need to navigate a host of government regulations and reporting requirements.
Take hybrid cloud to the next level with a hybrid enterprise transformation. One without the other is a half-baked approach, according to Capgemini analyst Subir Dutt.
In order to ensure successful App-V deployment and get the most out of application virtualization, users should study up on App-V’s server and client-side components.
Application virtualization improves centralized control of complex applications without endpoint installation and management hassles.
With the advent of NFV, IT managers are finding new ways to improve data center networking.
In this installation of our VMware vRealize deployment guide, we take an in-depth look at creating virtual machine blueprints and servers with vRealize Automation.
Long-distance vMotion eliminates practical geographical limitations by raising the round-trip latency limit.
Expert Steve Bigelow explains how instant clone technology helps VMware's vSphere Integrated Containers supply a baseline Linux OS and, as a result, increase greater hardware isolation and security.
Council takes a platform approach to customer services in a five-year deal with Civica
The IT industry is facing a growing skills gap, so what does it think about the announcement of the Department for Education’s budget during the 2015 spending review and autumn statement?
A series of causeways built to protect ships at anchor from German U-boats are being pressed into use to bring fibre-optic cables to remote parts of the Orkney Islands