LogRhythm kommentiert: IT-Security von Kraft- und Wasserwerken ist nicht sicher

Deutsche Firmen und Einrichtungen rücken immer stärker in den Fokus von Hackern. Das Bundesamt für Sicherheit in der Informationstechnik (BSI) warnt seit langem vor massiver Cyber-Spionage

Read More
25 percent of breaches go undetected for more than 24 hours

Tripwire, Inc. has announced the results of a survey conducted by Atomic Research and sponsored by Tripwire of 102 financial organizations and 151 retail organizations in the U.K., all of which process card payments. The survey results indicate that recent data breaches have had little impact on...

Read More
Research reveals that some “advanced” threats are actually simple to execute

Imperva Inc. has released its April Hacker Intelligence Initiative report, "The Non-Advanced Persistent Threat." The report presents an in-depth view of how some techniques attributed to so-called Advanced Persistent Threats (APTs) require only basic technical skills. The report exposes...

Read More
LogMeIn acquires Ionia

LogMeIn, Inc. has acquired Ionia Corporation, a system integrator specialising in connected...

Read More
Fujitsu acquires GlobeRanger

Acquisition supports Fujitsu Global Defence Initiative, bringing secure solutions in an ever...

Read More
Wearable technologies can boost employee productivity by up to 8.5%

Wearable technologies have been found to boost employee productivity by 8.5%, experts from...

Read More
Lancope expands Global Secure Partner Programme

Secure Partner Program enables resellers to deliver in-depth network visibility and security...

Read More
Akamai Media Cloud Workflow erfüllt die MPAA-Sicherheitsanforderungen

Durch den integrierten DRM-Schutz in Studioqualität, wie ihn die Urheberrechtsvorgaben der...

Read More
Orange Business Services and Sia Partners analyse new ways of working in the digital era

Orange Business Services and the consultancy Sia Partners have released a position paper which...

Read More
Beyond Compliance: using PCI DSS to improve overall security

By Andrew Avanessian, VP of Professional Services, Avecto.

Read More
iboss Network Security tracks data flow

Advanced behavioural data analysis detects threats through anomalies in data movement.

Read More
C2C announces availability of Compliance365

New offering gives Office 365 users better control over secured archives.

Read More
Spirent brings vulnerability scanning and load testing on a Cloud-based platform

ArmorHub and Blitz.io make Website and Application development fun, easy and inexpensive for anyone...

Read More

Videos

Lee Caswell, SVP, Product and Solutions Marketing at Nutanix, discusses the findings of its seventh annual Enterprise Cloud Index (ECI) survey and research report, which measures global enterprise progress...
Bill Andrews, ExaGrid President and CEO, addresses many of the misconceptions around the cost of different backup storage options, with many end users struggling to understand the long-term costs associated...
Mike Hoy, CTO, Pulsant, outlines some of the end user uncertainties related to cloud - discussing network connectivity, data sovereignty and data migration concerns. With AI set to ask further cloud questions,...
Jenny Briant, Academy Operations Director at the Ten10 Academy, shares valuable insights on empowering women in tech and promoting inclusive workplaces – including building a career in tech without a...

Expert Opinions

By Peter Miller, Sales Manager at ETB Technologies.
By Chris Carreiro, CTO at Park Place Technologies.
By Mike Fry, Infrastructure Data & Security Solutions Director at Logicalis UK&I.