Slideshows - Page 6
The Pwnie Express Internet of Evil Things report finds that most cyber-security professionals expect a major attack in the next five years.
Crypto-currency mining malware that aims to hijack the processing power of large scale corporate computing systems holds the top spot in Check Point Software’s list of top malware threats.
Risk Based Security reports that a record 5,375 unique vulnerabilities were reported in the first three months of 2018 but most have a documented solution.
To take analytics to the next level, IT must work closely with business leaders to ensure the investment addresses the most potentially valuable needs throughout the enterprise, while documenting the kind of ROI that can gain broad buy-in, according to a McKinsey report.
Google says its AI-driven Duplex interactive voice response system that sounds remarkably human will bring improve customer service and save employee time devoted to answering repetitive questions. But it also raises ethical questions.
AWS offers a dizzying amount of options from which companies moving to the platform must choose. eWEEK helps make sense of all of this to help you find a solution that best fits your company’s needs.
Red Hat announces new products and expanded partnerships with IBM and Microsoft at its annual customer event.
HP has extended its EliteBook 700 series of business notebook PCs with three new models equipment with Advanced Micro Devices Ryzen processors and Radeon Vega graphics cards.
Adoption of IT automation is dividing businesses today into the haves and have nots, with the latter missing out on improved agility, product delivery, customer experiences – and profits.
The Kubernetes ecosystem continues to grow with new projects and capabilities, which were highlighted at KubeCon and CloudNativeCon Europe 2018.