Ovum announces winners of inaugural “BYOX Strategy” awards
  • Posted on 11th June 2013 in by Phil Alsop

UCLH, SAP and Irell & Manella recognised for enterprise innovation and best practice in the field of BYOD.

Read More
UK businesses lead the way in secure flexible working
  • Posted on 11th June 2013 in by Phil Alsop

More than a third of SMBs have implemented policies and IT systems to manage employees’ devices for work purposes, finds Citrix-commissioned YouGov survey.

Read More
RSA bekämpft mit Big-Data-Analysen Online-Bedrohungen in Echtzeit
  • Posted on 11th June 2013 in by Phil Alsop

RSA, die Sicherheitssparte von EMC, hat heute die neue Version 4.0 von RSA Silver Tail vorgestellt. Damit können Unternehmen Aktivitäten auf Webseiten besser darstellen und normales Nutzungsverhalten von potenziellen Angriffen unterscheiden. Sicherheitsteams differenzieren schnell...

Read More
IT leaders fear data fragmentation is putting businesses at risk
  • Posted on 10th June 2013 in by Phil Alsop

82% see decision making hurt by data fragmentation. 93% struggling to control corporate data. 83% see security risks as data is spread across corporate or ‘Shadow IT’ networks.

Read More
Ovum warns BYOD is here to stay and urges CIOs to respond with a clear strategy

Bring-your-own-device (BYOD) is here to stay, states Ovum, as it reveals the findings of its 2013...

Read More
Increasing IT complexity and need for data security drive growth in outsourcing

Cloud based infrastructures now dominant – 60% use hybrid or cloud only.

Read More
Nottingham Building Society strengthens security

Varonis has detailed how Nottingham Building Society is using Varonis DatAdvantage and...

Read More
Mobile security in the spotlight

63% of businesses do not attempt to manage corporate information on employee-owned devices; mobile...

Read More
Most data breaches caused by human and system errors

Symantec Corp. and the Ponemon Institute have released the 2013 Cost of Data Breach Study: Global...

Read More
DDoS for the data centre

Juniper Networks has announced the availability of Junos® DDoS Secure to protect data centres...

Read More
UK SMEs still reluctant to embrace key technology trends

SolarWinds has revealed the results from SolarWinds' Cloud Computing and BYOD Study, ("the...

Read More
Application-layer DDoS detection

New capability enables organisations to obtain multi-faceted protection against distributed...

Read More
Höchste Sicherheit für Patientendaten: HS256S stellt "digitale Schweigepflicht" in Arztpraxen sicher

Wer zum Arzt geht, der muss vertrauen: In erster Linie in die Kompetenz und Professionalität...

Read More
Der Informationsrisiko-Index:

Warum die Bewertung von Informationsrisiken für mittelständische und große...

Read More

Videos

Dr. J Metz, SNIA Chair, explains how AI workloads are extraordinarily complex and constrained by issues related to latency, space, power and cooling, memory, and cost and how addressing these problems through...
Adam Salley, Sr. Director, Solutions Specialists, Kaseya, provides a comprehensive, insightful overview of the many topics and technologies impacting the Business Continuity Disaster Recovery (BCDR) landscape...
In this video, we talk to Wesco Anixter at the DCA's 10x10 2025.
Rob Finn, VP International Sales at Chainguard, discusses the company’s new Global Partner Program, offering flexible incentives, technical enablement, and go-to-market support to empower channel resellers...

Expert Opinions

By Krishna Vishnubhotla, Vice President of Product Solutions, Zimperium.
By Vivek Swaminathan, Director of Products and Solutions, Digital Workplace Solutions, Unisys.
As the streaming landscape evolves, content security through DRM becomes crucial for FAST and AVOD platforms to balance reach with protection.
Carlos Buenano, CTO for OT at Armis, outlines how cyber exposure management is reshaping protection strategies for remote and critical systems.