Building on earlier efforts to harness cloud computing to support growing compute workloads, DBS’s new private cloud datacentre will be smaller, greener and cheaper to run
A Muslim hacktivist group has hacked into Islamic State’s news site and published thousands of subscribers’ details just hours after the site claimed it was impenetrable
Just 25% of UK law firms are ready for the General Data Protection Regulation and one in five have experienced an attempted cyber attack in the past month
Waltham Forest Council in London is to allow Arqiva to deploy small cell technology on 16,000 lampposts across the borough
New minister for digital government talks about plans for more digital services, the importance of digital in Brexit, and the roll-out of Gov.uk Verify
The Emergency Services Network roll-out has hit further delays and is likely to become very costly indeed, the Public Accounts Committee has heard
Panasas hybrid storage offers 57 PB of raw capacity with 200 shelves. ActiveStor Director 100 sits atop a rack of Panasas arrays. Customers can scale types and capacities of media.
A new proof-of-concept exploit, called AVGater, has found a way to abuse antivirus quarantines to attack systems and gain full control.
The headline-grabbing breaches that hit Accenture and Equifax in 2017 could have been averted had basic cyber hygiene been in place
New arrangement allows Department for Work and Pensions to pay higher base salaries to encourage staff expecting private sector wages
The White House wants a more open Vulnerabilities Equities Process and has unveiled a new VEP Charter in order to promote transparency in bug reviews.
The high court judge managing the sub-postmasters versus Post Office legal case over an allegedly faulty computer system tells legal teams to cooperate
Julius Baer banks on higher returns after replacing on-premise systems with cloud HR services
Information security leaders in Europe believe a major breach of critical infrastructure is coming and that data breaches in their own organisations are imminent – yet most are not ready
One startup's 'Google-style' software-defined storage upgrade features 'table stakes,' such as volume mirroring for disaster recovery and support for Mac and Windows clients.
Experts are still unsure about the Vulnerabilities Equities Process, but admit the new VEP Charter could be a good step toward improving federal vulnerability review.
A lengthy Kaspersky report offers more insight into how the antivirus company discovered Equation Group malware and came to possess classified U.S. government data.
Bloggers look into LiveAction software aimed at provisioning resources, the threat posed by the cybersecurity skills shortage and using Linux for data center switches.
News roundup: In under a week after its release, researchers were able to bypass the main iPhone X security feature, Face ID. Plus, Microsoft patched a 17-year-old flaw, and more.
An anonymous security researcher has once again earned the top Google bug bounty prize in the Chrome Reward Program for a Chrome OS exploit chain.