F5 Networks erwirbt Versafe und unterstützt so seine Kunden beim Schutz vor Online-Betrug
  • Posted on 19th September 2013 in by Phil Alsop

F5 Networks gab die Übernahme der Versafe Ltd. bekannt. Mit der Übernahme erweitert F5 sein Produktportfolio mit Web-Anti-Fraud-, Anti-Phishing und Anti-Malware-Lösungen. Die Kombination der Web- und Mobile-Lösungen mit den Security Operation Centers (SOC) ergänzt die...

Read More
GFI Software launches GFI LanGuard 2014
  • Posted on 18th September 2013 in by Phil Alsop

To meet increasing threat levels, GFI expands GFI LanGuard’s vulnerability assessment capabilities to include mobile operating systems, Linux distributions, and even more third-party applications.

Read More
ISACA releases “Configuration Management: Using COBIT 5” to help businesses manage change
  • Posted on 18th September 2013 in by Phil Alsop

Change can cause business disruptions, inefficiencies and financial losses. Proper configuration management (CM) reduces the risk of malfunctions and increases efficiency during times of IT-related change. To help enterprises implement effective CM, global IT association ISACA has released a new...

Read More
100% of commuters put company data at risk over free public Wi-FI
  • Posted on 18th September 2013 in by Phil Alsop

Commuter study reveals commuters regularly connect to free, unsecure Wi-Fi services during their daily journey, putting personal and company data at risk every week.

Read More
Virtual Panda thrives in the cold

Logistics provider Peter Green Chilled offer Temperature Controlled services to the food industry...

Read More
Allianz partners with forensic IT experts

Cyber crime is costing the UK economy £27bn.

Read More
3M study reveals French concerns about shoulder surfing

Survey shows nearly half of French adults are concerned about visual data security; almost two...

Read More
Study reveals “big doubts” over mobile compliance

Only 18 percent of organizations are confident that their mobile policies are compliant with...

Read More
Lieberman Software and Qualys integration

Lieberman Software Corporation and Qualys, Inc. have announced the integration between Enterprise...

Read More
Strategic partnership with Ingram Micro UK

Outsourcery plc has agreed a strategic partnership with Ingram Micro UK, a division of Ingram Micro...

Read More
Passive Vulnerability Scanner now available

Drop-in solution identifies security and compliance violations in BYOD, cloud, and Virtual...

Read More
Major vendors and ICT channels come together to address the surge in customer demand for managed services

IT Europa and Angel Business Communications today announced further details of the Managed Services...

Read More
Wick Hill appointed Guidance Software distributor

Wick Hill appointed distributor for Guidance Software - a world leader in digital forensics, cyber...

Read More
Skills gap remains

New report from the UK Commission for Employment and Skills reveals that IT specialists are the new...

Read More
Five steps to prepare for a DDOS attack

By Sean Leach, Vice President of Technology for Verisign.

Read More

Videos

Adam Salley, Sr. Director, Solutions Specialists, Kaseya, discusses the current business continuity and disaster recovery landscape.
Adam Salley, Sr. Director, Solutions Specialists, Kaseya, provides a comprehensive, insightful overview of the many topics and technologies impacting the Business Continuity Disaster Recovery (BCDR) landscape...
David Primor, Ph.D., Co-founder and CEO of Cynomi, discusses the launch of ELEVATE, a new partner program purpose-built to drive growth, scalability, and success in the delivery of cybersecurity, compliance,...
In this video, we talk to RiT Tech at the DCA's 10x10 2025

Expert Opinions

Carlos Buenano, CTO for OT at Armis, outlines how cyber exposure management is reshaping protection strategies for remote and critical systems.
By Rob Hankin, Chief Technology Officer at Cybit.
As the streaming landscape evolves, content security through DRM becomes crucial for FAST and AVOD platforms to balance reach with protection.