Exponential increase in new and unknown malware
  • Posted on 12th May 2014 in by Phil Alsop

Report based on monitored security events from over 10,000 organisations worldwide.

Read More
Barracuda SSL VPN extends private cloud access to mobile devices
  • Posted on 12th May 2014 in by Phil Alsop

New version improves mobile phone and tablet access to internal web applications and files.

Read More
EMC unveils Business Partner Program
  • Posted on 12th May 2014 in by Phil Alsop

EMC Corporation has announced the new global Business Partner Program (BPP) providing EMC® partners with a common, unified framework. The new BPP brings together all previous EMC partner programs to create a simple, predictable and profitable experience for each partner. Designed in concert...

Read More
Security tops compliance in defence against data breaches
  • Posted on 12th May 2014 in by Phil Alsop

By Richard Hibbert, CEO, SureCloud.

Read More
Common obstacles remain for IT leaders

CIO Strategic Marketing Services / IDG Research Services survey sponsored by Red Hat shows...

Read More
Secure Over-the-Internet capability

With security being a top concern, DameWare Remote Support 11.0 allows IT Pros to support end-users...

Read More
DNB, Norway’s largest financial services institution entrusts HCL with running the bank’s IT operations

$400mn agreement sees HCL take prime responsibility for running infrastructure and application...

Read More
Toshiba and Becrypt announce partnership

Toshiba to ‘bundle’ Becrypt Security with its mobile devices to target key markets...

Read More
Iron Mountain-Studie zum ‚Recht auf Vergessen‘

Mehrheit der Befragten ist pessimistisch, was Umsetzung betrifft; nur Hälfte der Deutschen...

Read More
Neuer HP-Sicherheits-Service senkt das Geschäftsrisiko

Die ab sofort verfügbaren HP Security Metrics Services unterstützen Kunden dabei,...

Read More
Window-Surfing: Die Fenster weit geöffnet für den Datenklau?

In einer Umfrage geben Unternehmen zu, dass sie auf vergleichsweise simpel anmutende...

Read More
LogRhythm kommentiert: IT-Security von Kraft- und Wasserwerken ist nicht sicher

Deutsche Firmen und Einrichtungen rücken immer stärker in den Fokus von Hackern. Das...

Read More
25 percent of breaches go undetected for more than 24 hours

Tripwire, Inc. has announced the results of a survey conducted by Atomic Research and sponsored by...

Read More
Research reveals that some “advanced” threats are actually simple to execute

Imperva Inc. has released its April Hacker Intelligence Initiative report, "The Non-Advanced...

Read More
LogMeIn acquires Ionia

LogMeIn, Inc. has acquired Ionia Corporation, a system integrator specialising in connected...

Read More

Videos

Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
Work AI leader Glean has launched the Work AI Institute, a first-of-its-kind research initiative - supported by faculty from Stanford, Harvard, Berkeley, Notre Dame, and others - dedicated to decoding what...
Lenaik Andrieux, General Manager – Power Systems EMEA, India & Australia, Rehlko, explains how the acquisition of The Wilmott Group, a UK-based supplier of critical backup-power solutions, makes Rehlko one...
Alex Walsh, Regional VP of Channel Sales, EMEA North at Keepit, discusses the company’s channel-first strategy, broad SaaS data protection, and how MSPs can differentiate amid consolidation and cyber risks,...

Expert Opinions

By Graham Jarvis, Freelance Lead Journalist - Business and Technology, Trudy Darwin Communications
By Jon Healy, Regional Strategic Operations Officer, EMEA, at Salute.
By Rishi Kapoor, Head of WW Partner Sales Engineering & Solutions: Technology & Innovation Partners at Alteryx