Windows XP - ein alter Hut? Nicht für die Politik

"Never change a running system" - Anwender, die noch Windows XP (und übrigens auch MS Office 2003) einsetzen, sollten sich schleunigst von dieser Handlungsanweisung, die eigentlich so viel Wahres enthält, verabschieden

Read More
Stärkere Verschlüsselung: Umstellung von SSL-Zertifikaten auf SHA-256 wird forciert

In knapp drei Jahren ist es soweit: Im Januar 2017 läuft die Deadline für SSL-Zertifikate aus, die auf dem kryptografischen SHA-1-Hash-Algorithmus basieren

Read More
Acronis Studie bestätigt das Klischee des sicherheitsbewussten Deutschen

Jeder zweite Deutsche von Datenverlust betroffen – nur 89,3% führen eine Datensicherung durch

Read More
TIM AG: Enterprise Security Lösungen von Symantec wieder im Portfolio

Ab April 2014 können Systemhauspartner wieder das gesamte Symantec Portfolio über den...

Read More
Cyber attack ‘Hit List’ expands

Disruptive hacking tactics see financial services industry join government as most at risk for DDoS...

Read More
Virtual Windows sealed while physical Windows left wide open

Survey finds many organisations leaving themselves open to simple social engineering practice on...

Read More
Thales secures the connectivity of Highways Agency

Thales has been awarded a 5-year contract to provide secure network connectivity services for the...

Read More
NSA revelations impact on the Cloud

Report highlights nine major after-shocks compelling organisations to think again about how they...

Read More
Integrated retrospective packet forensics

Network operators get simplified access to real-time KPIs, proactive alerts, and historical traffic...

Read More
Government surveillance is driving a third of organizations away from the Cloud

A third of IT security professionals do not keep corporate data in the cloud because of fear of...

Read More
NTT Innovation Institute announces availability of 2014 Global Threat Intelligence Report

Analysis of three billion attacks in 2013 reveals SQL Injections cost $196,000 and anti-virus...

Read More
Don’t let Snowden Leaks chill cloud adoption

By Campbell Williams, group strategy and marketing director, Six Degrees Group.

Read More

Videos

Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.
Joshua Clay, Senior Director Solutions Engineering at Dynatrace, discusses the findings of the company’s ‘The State of Observability Report 2025’, which reveals that while AI adoption is accelerating,...
Lenaik Andrieux, General Manager – Power Systems EMEA, India & Australia, Rehlko, explains how the acquisition of The Wilmott Group, a UK-based supplier of critical backup-power solutions, makes Rehlko one...
Alex Walsh, Regional VP of Channel Sales, EMEA North at Keepit, discusses the company’s channel-first strategy, broad SaaS data protection, and how MSPs can differentiate amid consolidation and cyber risks,...

Expert Opinions

By Chris Ackerson, SVP of Product at AlphaSense.
By Alistair Barnes, Head of Mechanical Engineering at Colt Data Centre Services.
IDTechEx Technology Analyst Noah El Alami discusses the potential of the new generation of nuclear technologies – fission small modular reactors (SMRs) and fusion energy – in powering the ever-increasing...