Security researchers say the vulnerability behind the infamous Stuxnet worm is still the most exploited in the world, seven years after being patched.
News roundup: The Hajime worm is the nicer, sneakier brother of Mirai malware. Plus, the FBI and CIA hunt for the Vault 7 whistleblower, Symantec adds to Zscaler lawsuit, and more.
Juniper's Kevin Walker talks with SearchSecurity about his company's Software-Defined Secure Network platform, improving SDN security, and the evolution of machine learning.
The misuse of the phrase 'cloud computing' has created misperceptions of the technology. Remember that the cloud isn't a location -- it's a more agile way to design IT services.
IT shops with specific workload requirements continue to choose specialty IaaS offerings over the more rigid services from cloud giants like AWS, Azure and Google.
Microsoft recently released Azure Functions to stand up to AWS Lambda. Learn how to get started with this event-driven service, and if it's the right fit for you.
Updates this week to Redshift and DynamoDB, plus AWS CodeStar, a service for CI/CD workloads, aim to streamline use of several Amazon services.
SysOps teams must maintain consistent workload performance, meet compliance and security standards, as well as other IT tasks. AWS Config helps admins keep a watchful eye on apps.
A host of tools exist to test application performance in AWS. One company explains how it used AWS Lambda and other native tools to reduce costs and keep QA and engineering happy.
The race to transform legacy IT into a cloud-first operation might be moving slower than you think. Take this quiz and see if your company's progress is ahead of the curve.
Mobile development is tricky and harder still when trying to integrate it with an enterprise platform. MBaaS has the potential to simplify things. Expert Tom Nolle explains.
Visual Basic apps were never meant to run in the cloud, but with automated code conversion tools, their tried-and-true business logic can be refactored and reused.
The evolution of container management platforms may be generating a lot of buzz, but the software needs further improvement before it makes sense for organizations to invest in it.
Multiple virtualization hosts are typically used for failover clustering purposes, but that isn't always feasible. Sometimes it's okay to use a stand-alone host.
With more than a dozen new features in Hyper-V 2016, it can be difficult to navigate them all. Save yourself some time and look at these five key features first.
The new vSphere REST API comes with a number of advanced capabilities that simplify automation and management. Here are a few ways to best use its capabilities.
A host of new VMware Horizon 7.1 features add support for Microsoft's Skype for Business and aim to improve the remote user experience.
Logs have been an integral piece of troubleshooting. New enhanced logs boosts vSphere security by providing much more detail about errors and changes.
Use of technology in the country’s police forces remains poor, according to chief inspector of constabulary Thomas Windsor, who is calling for a decision-making mechanism procuring, establishing and running police IT
Business secretary Greg Clark announces Industrial Strategy Challenge Fund, committing more than £1bn over four years
Security will become increasingly important as industries seek to collaborate and use each other’s capabilities to enable new business models, with the banking sector leading the way