cPacket enhances forensic analytics
  • Posted on 31st March 2014 in by Phil Alsop

cPacket has added its new cStor high speed recording technology to its cVu performance monitoring tools to build a forensic analysts suite

Read More
US banks take Trustwave and Target to court
  • Posted on 27th March 2014 in by Phil Alsop

In the aftermath of the major security attack on the Target supermarket chain in the USA, two banks are suing Target and Trustwave for damages following alleged multiple failings in PCI-DSS compliance testing

Read More
Service Level Agreements und Cloud Computing
  • Posted on 27th March 2014 in by Phil Alsop

SLAs als Schlüssel zur Cloud von Diethelm Siebuhr, CEO der Nexinto Holding

Read More
Doubts exist about new GSC security labelling scheme
  • Posted on 25th March 2014 in by Phil Alsop

It is said to be, in many ways, a good simplification of the old GPMS system that will help take it into business markets as well as Government, but it has some weak-spots that will not help improve security in some areas

Read More
Confidential sharing for enterprises and governments

Making information both available to share with the right people, but secure from the eyes of all...

Read More
Microsoft case shows users must watch those Ts & Cs

The fact that Microsoft read the Hotmail emails of a US blogger to find evidence against an...

Read More
Silver Peak stellt WAN-Optimierung für Equinix Performance Hub zur Verfügung

WAN-Optimierungslösungen von Silver Peak bieten Kunden von Equinix Performance Hub eine...

Read More
Coming standards for mobiles combine ID security and ease of use

NAPPS and SCIM are two new standards due to appear over the next eighteen months which will both...

Read More
Arbor applies analytics to security

Available as a cloud-delivered service or for on-premise use, Arbor’s Pravail Security...

Read More
Skybox offers free threat data

Information on the latest security threats that can help users identify and quantify the...

Read More
Morrison theft shows insider hacks a security weakpoint  

Comments from security industry specialists suggest that there are ways of guarding businesses...

Read More
Think mashup says Go Daddy’s Irving

The CEO of CSP Go Daddy got evangelistic at the Parallels Summit about the opportunities that...

Read More
F5 erweitert Synthesis-Architektur mit höherer Absicherung für das Web und erweitertem Schutz vor Betrug

Die neuen Lösungen bieten Unternehmen einen breitgefächerten Schutz für Netzwerke,...

Read More
Tools to help with new NIST framework

Promontory provides tools to exploit the new US cyber-security standards that help financial...

Read More
Sophos gets UTM to the SMBs

Unified Threat Management is normally considered a tool for the large enterprise, no matter how...

Read More

Videos

Nicolas Leszczynski, Principal Solutions Engineer at Riverbed Technology, discusses the findings of the company’s 2025 Future of IT Operations in the AI Era report. Despite record investments, only 12% of AI...
Richard Jelbert, CEO of Cyberrock, discusses how, in today’s fast-changing digital landscape, businesses of all sizes face relentless cyber threats often without the dedicated resources or in-house expertise...
Chris Gilmour, CTO of Axians UK, explains how Axians, the ICT brand of VINCI Energies, and Nokia are deepening their strategic collaboration to drive the next phase of communications infrastructure and mobile...
Eric Herzog, Chief Marketing Officer at Infinidat, outlines how and why Infinidat has seen outstanding success with the launch of the InfiniBox® G4 Family, creating a new foundation for the future with...

Expert Opinions

By Rohan Vaidyanathan - Vice President, Content Intelligence, Hyland.
By Luca Rizzo, Segment Manager at ABB Motion High Power.
By Adriaan Bekker, CISO & Microsoft Services Director, Softwerx.
TES Power’s Managing Director, Michael Beagan explores the top five power challenges the data centre industry may face in 2026, in light of the surge in AI. With a huge increase in demand, power is becoming...