Insider threats and employee-owned devices identified as the greatest risks

New findings from network security management provider AlgoSec also indicate poor change management processes lead to network and application outages.

Read More

Belief in security breaches

A survey conducted recently by Lieberman Software Corporation reveals that more than 70% of IT security professionals would not be willing to bet $100 of their own money that their organization will not suffer a data breach in the next six months.

Read More

Truth and lies about latency in the Cloud

By Jelle Frank Van Der Swet, who manages the pan-European marketing and product development programme for Interxion’s sizeable and fast-growing cloud community.

Read More


Red Hat advances OpenStack Enterprise and Community technologies and roadmap

Red Hat, Inc. has announced updates to its OpenStack enterprise and community technologies and roadmap, including the advancement of its enterprise Red Hat OpenStack offering into an Early Adopter Program and the availability of RDO, a community-supported distribution of OpenStack that runs on Red Hat Enterprise Linux, Fedora and their derivatives. In addition, Red Hat has also announced Red Hat OpenStack Cloud Infrastructure Partner Network, a global ecosystem of technology and services...

Read More


Nutanix Data Lens can detect threats within 20 minutes and delivers 1-click recovery.
New study shows most IT managers estimate downtime costs £10,000-£20,000 per minute.
Lightning-fast processing capabilities accelerate all data-heavy tasks and enable processing of...
Funding drives progress in open source software to tackle global societal challenges, focusing on...
Plans to explore quantum computing for semiconductor research.
Industry's most flexible backup solution also includes enhanced data management platform, and cloud...
Latest Video

Technical Discussion: Encryption and Security at High Speed over Distance for IP Storage

Why do so many IP replication solutions lack encryption capabilities, and why is performance an issue when you need to encrypt data inflight? Check out Brocade subject matter experts discussing the challenges of maintaining security while replicating data between data centers at high throughput, including how Brocade addresses this architecturally with IP Extension.

Read more