Abgelaufene Zertifikate auf eBay-Servern: Es kann jeden treffen

Die Krux mit den abgelaufenen SSL-Zertifikaten kennen viele Website-Betreiber aber auch Internet-Nutzer zu genüge

Read More

IT-Automatisierung beseitigt menschliche Fehlerquellen - Von Jonathan Crane, Chief Commercial Officer bei IPsoft in New York City

Mit schnelleren Netzwerken, einer höheren Verfügbarkeit und einem verbesserten Performance-Management ist die IT heute besser aufgestellt als noch vor einigen Jahren. Allerdings gibt es nach wie vor ein Problem, das die IT-Performance negativ beeinflusst und bisher in aller Regel noch nicht beseitigt ist: der Mensch als Fehlerquelle

Read More


Tenable Network Security joins Amazon Web Services (AWS) Marketplace

Nessus vulnerability, configuration, and patch assessment solution now available for AWS customers.

Read More

Acronis delivers enterprise-grade control and security for mobile file access and sharing in the Enterprise

Acronis® has released activEcho® 3.0 and mobilEcho® 5.0, providing enterprise-level management combined with consumer-grade simplicity for secure file access, synchronisation and sharing on mobile devices. These two products now include the Acronis Policy Engine, which provides granular management capabilities to create security policies and ensures control and compliance on all devices.

Read More

Phishing attacks are regarded as the greatest cyber threat.
96% of UK organisations now feel confident in the security offered by Public Cloud providers.
A leading crime lawyer predicts 2016 to be the year where organisations appoint dedicated cyber...
 NCC Group, global cyber security and risk mitigation expert, is offering unique threat...
Latest judgements against British Airways and Marriott producing fear of fines (32%) and increasing...
The results of the 10th Annual Market Pulse Survey fromSailPoint Technologies Holdings expose an...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more