Neuer HP-Sicherheits-Service senkt das Geschäftsrisiko

Die ab sofort verfügbaren HP Security Metrics Services unterstützen Kunden dabei, schnelle, datengestützte Entscheidungen bei Sicherheitsrisiken im Unternehmen zu treffen. Dabei wird eine zum Patent angemeldete Methodik eingesetzt. Sie zeigt deutlich auf, wie sich ein...

Read More
Window-Surfing: Die Fenster weit geöffnet für den Datenklau?

In einer Umfrage geben Unternehmen zu, dass sie auf vergleichsweise simpel anmutende Social-Engineering-Versuche hereingefallen sind

Read More
LogRhythm kommentiert: IT-Security von Kraft- und Wasserwerken ist nicht sicher

Deutsche Firmen und Einrichtungen rücken immer stärker in den Fokus von Hackern. Das Bundesamt für Sicherheit in der Informationstechnik (BSI) warnt seit langem vor massiver Cyber-Spionage

Read More
Toshiba and Becrypt announce partnership

Toshiba to ‘bundle’ Becrypt Security with its mobile devices to target key markets including Healthcare and Local Government.

Read More
25 percent of breaches go undetected for more than 24 hours

Tripwire, Inc. has announced the results of a survey conducted by Atomic Research and sponsored by...

Read More
Research reveals that some “advanced” threats are actually simple to execute

Imperva Inc. has released its April Hacker Intelligence Initiative report, "The Non-Advanced...

Read More
LogMeIn acquires Ionia

LogMeIn, Inc. has acquired Ionia Corporation, a system integrator specialising in connected...

Read More
The desk is dead! Long live the desk!

Rise of mobile devices is adding to workplace pressure, but the office remains King when it comes...

Read More
Lancope expands Global Secure Partner Programme

Secure Partner Program enables resellers to deliver in-depth network visibility and security...

Read More
Akamai Media Cloud Workflow erfüllt die MPAA-Sicherheitsanforderungen

Durch den integrierten DRM-Schutz in Studioqualität, wie ihn die Urheberrechtsvorgaben der...

Read More
Wearable technologies can boost employee productivity by up to 8.5%

Wearable technologies have been found to boost employee productivity by 8.5%, experts from...

Read More
Fujitsu acquires GlobeRanger

Acquisition supports Fujitsu Global Defence Initiative, bringing secure solutions in an ever...

Read More
Spirent brings vulnerability scanning and load testing on a Cloud-based platform

ArmorHub and Blitz.io make Website and Application development fun, easy and inexpensive for anyone...

Read More
C2C announces availability of Compliance365

New offering gives Office 365 users better control over secured archives.

Read More

Videos

Lenaik Andrieux, General Manager – Power Systems EMEA, India & Australia, Rehlko, explains how the acquisition of The Wilmott Group, a UK-based supplier of critical backup-power solutions, makes Rehlko one...
Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.

Expert Opinions

By Manvinder Singh, VP of Product Management for AI at Redis.
By Jon Healy, Regional Strategic Operations Officer at Salute.
The Opportunities & Engineering Challenges Of Quantum Computing Within A Data Centre Environment – Taking learnings from other industries By Matthew Martin, Managing Director, Quantum Design Oxford.
By Linda Kerr, director of marketing, managed services at WatchGuard Technologies.