Last year's Target incident should be a wake-up call for IT to fundamentally change how they handle passwords.
A magistrate judge ruled that search warrants for online overseas data do not function in the same manner as warrants for physical data stored out of the U.S.
The latest flaw to strike every version of Microsoft's Web browser has been seen to be in active use by attackers.
Here's how to take advantage of Microsoft Remote Desktop Services (RDS) 8.0's new Connection Info notification in the Remote Desktop Client.
- By Greg Shields
Microsoft's free antivirus offering showed to be lacking when stacked up against its competitors.
Here's how to resolve a "password mismatch" error.
Plus: OpenVPN keys are also at risk of theft due to bug; first Heartbleed-connected arrest made.
Here's a look at some of the extreme environments that Microsoft's mobile devices are being put to the test.
So far, it's been quiet out there. But don't take the lack of news as an indication that the attackers have moved on.
Here's how to spot when new indexes are needed to improve performance.
- By Denny Cherry
While Web sites scramble to patch the vulnerability, it's time to change your online passwords.
This three-step process will get your virtual machines running on Microsoft's latest Windows Server version.
Here's some of the options IT has in tying their on-premise data storage with the cloud.
Microsoft's April Security Update features only two "critical" bulletins.
While Microsoft has had a very strong cloud focus in the past few years, look for a deeper on-premise enterprise theme at this year's event.
It's done it again. Citrix Systems, the company of two dozen products and 200 names, has announced yet another honorific for its flagship solution, Citrix XenApp 7.5.
- By Greg Shields
As Microsoft continues to find more places where it can integrate Bing , it's becoming less and less likely the company can -- or will -- sell off Bing.
- By Mary Jo Foley
Microsoft is increasingly assuming that IT departments everywhere will move to a services provider model, which essentially means you'll be outsourcing your infrastructures.
A series of internal message board posts detail how system admis are being targeted to gain access to the networks they control.
It's recommended that IT disable Rich Text Files from being opened through Microsoft Office.