Ivo Opstelten, Dutch minister of Safety and Justice The Dutch government on Thursday presented a draft bill that aims to give law enforcement the power to hack into computer systems — including those located in foreign countries ...
Tags: Dutch Bill, Computer Products
CA Technologies is acquiring Layer 7 Technologies, a purveyor of tools for managing and securing application programming interfaces (APIs). CA plans to integrate Layer 7 products into its own Identity and Access Management suite of ...
Tags: API Smarts, software
As part of its monthly issue of software patches, Microsoft has fixed a Windows vulnerability that would have allowed someone to subvert a computer's security using only a USB thumb drive and some attack code. The vulnerability, MS13-027, ...
Tags: Microsoft, USB hijack, software patches
Analysts say the proposal for internet users to delete their online data and become invisible online could create a black hole in the web economy. Tineka Smith reports. Last year the European Commission announced proposals for the 'right ...
Tags: internet, web economy, cyber security
Software as a service (SaaS) is a reality for IT shops of all shapes and sizes. CIOs and other IT leaders need the tools to manage their sprawling portfolios of SaaS applications with the same rigor they use for on-premise software. Here ...
Tags: SaaS, IT shops, IT leaders
Citrix today announced XenMobile, the rebranded and integrated mobile device management (MDM) software the company acquired through its acquisition of Zenprise last year. "What we've been doing ... is integrating Zenprise pieces with the ...
Tags: Citrix, Apple iOS, Android devices
Dell executives went on the offensive this week, claiming that the firm can trump Cisco in the information technology security market, as well as holding an edge against powerful rivals such as HP and IBM. “Cisco is a great ...
Citrix on Wednesdy announced XenMobile, a rebranded and integrated mobile device management (MDM) software, which the company acquired through its acquisition of Zenprise last year. “What we’ve been doing is integrating ...
Tags: Citrix, MDM Tool, Android, iOS Devices
IDG News Service - Salesforce.com CEO Marc Benioff on Wednesday doubled down on the company's embrace of social networking software, urging customers, partners and prospects to join him in a "social revolution," during a keynote address at ...
Tags: social networking software, networking software, software
IT often virtualises new applications and workloads by default.Virtualisation is now the norm,deploying a physical server the exception.Yet,a third of companies admit they have not invested in security for their virtual computing ...
A survey released by Lieberman Software Corporation has revealed that half (51%) of IT experts whose job roles focus on the cloud don’t trust the cloud for any of their personal data such as contact lists, music, photos, or Webmail. ...
New trends in computing, including social media and cloud computing, are challenging traditional approaches to computer security that will force organisations to adapt – or to risk marginalisation and extinction, according to Gartner ...
Tags: computing, computer security
Following its acquisition of Wyse earlier this year, Dell has announced it will be bolstering its software virtualisation portfolio with the acquisition of Quest Software. Dell said the $2.4bn acquisition will provide critical components ...
Tags: Dell, Quest Software, software virtualisation portfolio
Dell announced Monday that it is buying Quest Software for $2.4 billion, following weeks of speculation over its interest in the infrastructure software vendor. The deal is expected to close later this year. Quest's products include the ...
Tags: Dell, Quest Software, interest, infrastructure software vendor
More companies have dipped a toe into the Federated ID waters. But has the technology finally made it to prime time? Not really, according to two academic scholars specializing in the economics of information security technology. Many ...
Tags: Federated ID, technology, logistic hurdles