Buying Slack could give Amazon another enterprise toehold
Amazon is apparently interested in buying Slack Technologies, a move analysts say could allow Amazon to push further into the enterprise.
Amazon is apparently interested in buying Slack Technologies, a move analysts say could allow Amazon to push further into the enterprise.
Popular browsers such as Edge, Firefox and Chrome have lots of features -- and can take up lots of memory. We look at 5 lesser-known browsers for simpler surfing.
Almost anything can be had for free if the circumstances present themselves. Read through this compilation of stories about free stuff such as free apps for Windows 10 and tools for Windows 8.
When mixing personal and professional tasks on your smartphone, it's inevitable that someone is going to accidentally stumble onto malware. The SANS Institute's Chris Crowley has some advice on how to avoid trouble.
Penetration testing was much like taking a battering ram to the door of the fortress. Keep pounding away and maybe find a secret backdoor to enter through. But what happens if pieces of the network are outside of the fortress? With the flurry of Internet of Things devices, is it harder to conduct a pen test with that many devices and end points?
Retired Gen. Michael Hayden held nothing back when addressing cybersecurity pros at the ZertoCon conference in Boston.
Learn how to protect yourself in the Cloud from the next vulnerability and/or wide scale attack.
To protect users from public embarrassment their identities have been withheld in these true stories of failures to follow security protocol.
We used 1 million records exposed as our floor in creating this list. Starting with a number that big says a lot about the state of data security.
These disgruntled employees show what can happen when an employer wrongs them.
The retired Microsoft CEO is now ready to ride off into the sunset. But what will he do?
What is the equivalent in technology to Punxsutawney Phil seeing his shadow?
It was always thought that as Apple products increased in popularity, so would the target on its back placed by cybercriminals. Always looking to take down the king of the hill, cybercriminals finally got to Apple's Macs last week with a botnet that attacked more than 600,000 machines.
There has been wide speculation on what Apple's next iteration of its tablet will look like, feature and be named. Network World editor John Cox even is able to write a weekly story on the wild rumors surrounding the next iPad.
It used to be the IT department's answer was always no when an employee asked to use a personal device for work. IT often felt the risk was far too great to the company's network security to allow this.