Hadoop security comes under scrutiny
  • Posted on 19th March 2013 in by Phil Alsop

Dataguise has announced the results of a recent survey on the importance of securing sensitive data in Apache Hadoop environments. The study was conducted at the O’reilly Strata Conference and the RSA Conference where survey participants highlighted the need to secure sensitive information in...

Read More
Number of data leaks in government sector continues to rise
  • Posted on 18th March 2013 in by Phil Alsop

InfoWatch Research Center has released its latest annual report on worldwide data leaks reported by the press during 2012. According to InfoWatch analysts, more than 1.8 billion records were compromised in 2012, including those containing financial and personal data. The press reported 934...

Read More
Latest Claranet research highlights Bring Your Own Dilemma
  • Posted on 14th March 2013 in by Phil Alsop

96 per cent say mobile working benefits their organisation, but three quarters think BYOD increases security risk.

Read More
Ovum predicts radical change for the enterprise landscape by 2020
  • Posted on 14th March 2013 in by Phil Alsop

Citrix, Google, VMware and Yammer identified as disruptive players driving this transformation.

Read More
Huge savings from mobile working could cost businesses a fortune if they ignore off-site security

A report on remote and home working released today has found that British businesses could be...

Read More
Business leaders ignore responsibility for data in the cloud

Nine in 10 firms believe cloud service providers have accountability for data security.

Read More
Shadow IT lurks uncomfortably, for IT departments

The growth in ‘Shadow IT’ is leaving IT departments caught between a rock and a hard...

Read More
CIOs reassess their roles in the face of changing business requirements

Research highlights importance of CIOs building internal relationships with sales and marketing to...

Read More
New survey highlights worrying lack of guidance from employers on use of personal devices

A survey commissioned by the Information Commissioner’s Office (ICO) has shown many employers...

Read More
Introducing the Electronics Disposal Efficiency metric

The Green Grid launches first-of-its-kind metric to help organisations measure the responsible...

Read More
Ipswitch File Transfer announces WS_FTP Server 7.6

Adds enhanced security, database support and customisation capabilities to industry-leading file...

Read More
Trustwave opens Security Operations Center in Asia Pacific

Trustwave has opened a new Security Operations Center (SOC) in Manila, the capital of the...

Read More
Varonis says leaky apps and cloud data insecurities are the new corporate norm

Commenting on a New York Times story about the governance issues that portable devices and their...

Read More

Videos

In this in-depth conversation, Roy Azoulay, Co-founder and CIO of Cynomi, and Phil Bindley, Field CISO at Intercity Technology, explore how MSPs and MSSPs can turn regulatory compliance, AI governance, and...
Steven Heinsius, Vice President of Product Management & Marketing EMEA, explains what sets the new Cisco 360 program apart for MSPs. He highlights how it enables outcome-driven managed services and shares...
In this interview, Dave Baggett, SVP/GM Security Suite at Kaseya, discusses how MSPs can tackle rising complexity, manage vendor sprawl, and stay ahead of high-impact incidents. We explore Kaseya’s unified...
Lottie Tollman, Head of Data Centres Advisory, EMEA and Gonzalo Martín, Head of Data Centres Capital Markets, EMEA, both at Colliers, the international property adviser, explain why data centres are no longer...

Expert Opinions

By Michael Fasulo, Senior Director of Portfolio Marketing, Commvault.
By Frédéric Godemel, EVP Energy Management, Schneider Electric.
By Adhum Carter Wolde-Lule – Director at Prism Power Group.
By Paul Speciale, Chief Marketing Officer at Scality.