LogRhythms neue Identity Interference Engine verknüpft Benutzer-IDs mit Security-Ereignissen

LogRhythm 6.2 hilft dabei, auf Cyber-bedrohungen noch schneller und effizienter zu reagieren. Die neue und leistungsstärkere Version der führenden Security-Intelligence-Plattform bietet zudem eine für Mobilgeräte und Web-Browser optimierte Benutzeroberfläche, die alle...

Read More
Check Point collaborates with VMware

Check Point automates network security for VMware virtualization and cloud environments.

Read More
Steria survey reveals that overconfidence threatens the security of UK's enterprises

Steria has revealed that 96% of UK’s enterprises believe they are capable of dealing with a major security crisis, however only 19% of enterprises surveyed said they operated 24/7 IT security. This data is taken from a wider study Steria conducted on cyber security, which investigates how...

Read More
Sophos delivers Advanced Threat Protection for the small and mid-market

Sophos has announced an extensive update to its award winning Unified Threat Management solution,...

Read More
Company culture is holding back the Connected Business, not technology

Enghouse Interactive survey reveals culture and structure is inhibiting the growth of connected...

Read More
Software takes centre stage

New user-vendor forum set to define and promote OpenFlow-based, merchant-optical networking...

Read More
Tech Data Europe appoints SVO, Operations

Johan Vandenbussche will report to Néstor Cano, President Europe.

Read More
Tangled web of IT applications stunts digital transformation

Crowded application landscape is overwhelming IT departments and eroding competitive edge.

Read More
Information Governance Services to mitigate risk

HP doubles down on solving information governance challenges with a strong combination of services...

Read More
Cybercrime strikes more fear than NSA spying

Despite the NSA and Snowden controversy dominating news headlines and sparking a serious privacy...

Read More
NTT Com Security appoints John Theobald as Global CISO

Global information security and risk management company, NTT Com Security (formerly Integralis) has...

Read More
Dell SonicWALL threat researchers uncover nearly 80 billion incidents of post infection malware activity

Threat researchers discover trends in attack strategies and explore vulnerabilities in top industry...

Read More
Dell präsentiert neue Version seiner Lösung für sicheren Mobilzugriff

--- Neues Release von SonicWALL Secure Mobile Access bietet mobilen Mitarbeitern einen...

Read More
Dell SecureWorks adds two services to its security awareness training solutions portfolio

Dell SecureWorks is adding two new services to its portfolio of Security Awareness Training...

Read More

Videos

Chris Carreiro, CTO, Park Place Technologies, explains why so many AI ambitions are faltering and how organisations can navigate this complex landscape. Core issues to address include the underestimation of...
Ciaran Flanagan, Global Head of Data Center Solutions at Siemens, explains the decision for Siemens Smart Infrastructure to open a data centre technology hub in the Iberian region, before going on to discuss...
Ben Miller, Product Marketing Manager at Keysight Technologies, discusses the Keysight Artificial Intelligence (KAI) architecture, a portfolio of end-to-end solutions designed to help customers scale...
In this video, we talk to FlaktGroup at the DCA's 10x10 2025.

Expert Opinions

Dr Richard Lewis from Prysmian highlights the vital importance of power infrastructure.
By Aashna Puri, Global Strategy and Expansion Director, CyrusOne.
By Burley Kawasaki, Global VP of Product Marketing & Strategy, Creatio.
By Mark Jow, Technical Evangelist EMEA, Gigamon.