Insider threats and employee-owned devices identified as the greatest risks

New findings from network security management provider AlgoSec also indicate poor change management processes lead to network and application outages.

Read More
Belief in security breaches

A survey conducted recently by Lieberman Software Corporation reveals that more than 70% of IT security professionals would not be willing to bet $100 of their own money that their organization will not suffer a data breach in the next six months.

Read More
Increase in cyberespionage

Symantec Corp.'s Internet Security Threat Report, Volume 18 (ISTR) has revealed a 42 percent surge during 2012 in targeted attacks compared to the prior year. Designed to steal intellectual property, these targeted cyberespionage attacks are increasingly hitting the manufacturing sector as well...

Read More
AlienVault releases industry’s first Unified Security Management Virtual Appliance

Company responds to needs of mid-market enterprises for security visibility and reduced complexity with free trial and new pricing options.

Read More
Computacenter honoured with EMC Enterprise Partner of the Year 2012

Computacenter has been named EMC Enterprise Partner of the Year at the EMC 2013 Channel Awards on...

Read More
Intel accelerates data centre transformation

Using standard x86 servers and programmable switches to deploy and manage virtualized networking...

Read More
adesso unterstützt die Bundesrechtsanwaltskammer bei Einführung des elektronischen Anwaltspostfaches

Die Bundesrechtsanwaltskammer (BRAK) hat den IT-Dienstleister adesso AG mit den Vorbereitungen zur...

Read More
Fujitsu ETERNUS CS Unified Data Protection Appliance integriert Deduplizierungstechnologie von Quantum

Fujitsu integriert die branchenführende Deduplizierungstechnologie von Quantum in die neue...

Read More
Trusteer unveils new approach to stop Zero-Day attacks and APTs

Trusteer has announced the European launch of Trusteer Apex to protect enterprises against advanced...

Read More
Bring Your Own Device capability tops employee wish lists

Cloud computing makes affordable platform for Virtualised Desktop Infrastructure

Read More
IT managers increasingly concerned about DDoS attacks

New independent research commissioned by Corero Network Security shows that businesses are more...

Read More
By 2015, 10 percent of overall IT security will be delivered in the Cloud

By 2015, 10 per cent of overall IT security enterprise product capabilities will be delivered in...

Read More
One in four customers admit they do not trust any company to secure their personal information online

Banks trusted by the majority, but supermarkets and social networks least trusted.

Read More
Avnet Technology Solutions EMEA bids farewell to von Kuenheim

Avnet Technology Solutions has announced the departure of Fabian von Kuenheim, CEO of Magirus, from...

Read More
What companies must know about Bring Your Own Device to work

By Don Jackson, CISSP, a Senior Security Researcher with the Counter Threat Unit (CTUTM) Research...

Read More

Videos

Kevin Brown, Senior Vice President, EcoStruxure Solutions, Secure Power Division, and Alison Matte, Sustainability Lead EcoStruxure IT, both at Schneider Electric, explain the introduction of new model based,...
Dr. Avesta Hojjati, VP of Engineering at DigiCert, explains the thinking behind the creation of the first ever World Quantum Readiness Day – detailing the very real threat that quantum computing could...
Brandon Lucia, a Carnegie Mellon professor who recently founded Efficient Computer, a company that is producing a general purpose chip said to be up to 100 times more energy-efficient than leading...
Daniel Thorpe, Associate Director of Data Centre Research at JLL, explains the reasons behind the edge data centre market’s predicted doubling by 2026 – with data regulation, low latency demand and IoT...

Expert Opinions

By Hans De Visser, Chief Product Officer, Mendix.
By Rob Pocock, Technology Director, Red Helix.