Abgelaufene Zertifikate auf eBay-Servern: Es kann jeden treffen

Die Krux mit den abgelaufenen SSL-Zertifikaten kennen viele Website-Betreiber aber auch Internet-Nutzer zu genüge

Read More

IT-Automatisierung beseitigt menschliche Fehlerquellen - Von Jonathan Crane, Chief Commercial Officer bei IPsoft in New York City

Mit schnelleren Netzwerken, einer höheren Verfügbarkeit und einem verbesserten Performance-Management ist die IT heute besser aufgestellt als noch vor einigen Jahren. Allerdings gibt es nach wie vor ein Problem, das die IT-Performance negativ beeinflusst und bisher in aller Regel noch nicht beseitigt ist: der Mensch als Fehlerquelle

Read More


Tenable Network Security joins Amazon Web Services (AWS) Marketplace

Nessus vulnerability, configuration, and patch assessment solution now available for AWS customers.

Read More

Acronis delivers enterprise-grade control and security for mobile file access and sharing in the Enterprise

Acronis® has released activEcho® 3.0 and mobilEcho® 5.0, providing enterprise-level management combined with consumer-grade simplicity for secure file access, synchronisation and sharing on mobile devices. These two products now include the Acronis Policy Engine, which provides granular management capabilities to create security policies and ensures control and compliance on all devices.

Read More

McAfee has released its McAfee Threats Report: April 2021, examining cybercriminal activity related...
Younger employees anxious about company’s ability to tackle growing security threats.
Trend Micro has revealed that global organizations have on average 29 security monitoring solutions...
Cynet, the world’s first autonomous breach protection platform has appointed Nuvias as its...
Industry’s first intensive and customised cybersecurity training.
83% of survey respondents report the rise in remote workers increases the risk of a security...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more