LogRhythm kommentiert: Spotify bestätigt unautorisierten Zugriff auf IT-Systeme

Der Musik-Streamingdienst Spotify hat bestätigt, Opfer einer Cyberattacke geworden zu sein. Auf seiner Website berichtet das Unternehmen, dass es einige unautorisierte Zugriffe auf seine Systeme und internen Firmendaten aufgespürt hat

Read More
7 Elements expands team after period of high growth

IT security testing consultants, 7 Elements, has announced the expansion of its UK wide team with the appointment of three key roles, and with the imminent recruitment of an additional two team members. The business has enjoyed growth in the last twelve months and requires an expansion of the team...

Read More
More than 1 in 8 IT security pros can access previous employers’ systems using old credentials

Just over 13 percent of IT security professionals admit to being able to access previous employers’ systems using their old credentials, a new survey from Lieberman Software Corporation reveals.

Read More
Worldwide Threat Intelligence Security Services spending to exceed $1.4 billion by 2018

A consistent bombardment of unknown, targeted, and adaptive cyber threats are wreaking havoc in the...

Read More
21. MTI Technology-Kongress: Sicherheit für das Big Data Center

Programm aus hochkarätigen Experten- und Anwendervorträgen erstmalig um IT-Security...

Read More
GFI Software verbessert Bewertung von Schwachstellen sowie Patch-Management mit LanGuard 2014 R2

Mit LanGuard 2014 R2 bringt GFI Software eine neue Version seiner preisgekrönten...

Read More
Firehost appoints new Chief Security Officer

FireHost, the secure cloud provider, has appointed retired US Army Col. Jeff Schilling as chief...

Read More
Clavister partners with LeverTech

Partnership’s solutions for Government and private sector organisations will meet...

Read More
Putting patient data safety first

The Patient Safety Company and FireHost demonstrate how European healthcare records can be kept...

Read More
Trustwave report uncovers Cybercrime attack targets, victims, motivations and methods

Trustwave has released the 2014 Trustwave Global Security Report which reveals the top cybercrime,...

Read More
Cisco expands Advanced Malware Protection and data centre security solutions

Addressing customers' needs to combat zero-day attacks and advanced persistent threats (APTs),...

Read More
More enterprises plan to strengthen access security with multi-factor authentication

SafeNet Global Authentication Survey reveals more enterprises to adopt cloud-based authentication...

Read More
Metaways: Worauf Unternehmen bei Open-Source-Lizenzen achten müssen

Im Zuge der NSA-Affäre interessieren sich immer mehr Unternehmen für...

Read More
Datenpannen, Shitstorms – auch der Mittelstand ist gefährdet

Bei großen Unternehmen wie Facebook [1] oder Vodafone [2] kam es im letzten Jahr zu...

Read More

Videos

Greg Gyves, Director of Global MSP & GSI at TeamViewer, explores the real operational pressures MSPs are dealing with. He highlights expanding service boundaries, rising complexity, and the constant push to do...
Laura Allwood, now a fully qualified Project Manager at Arcadis, outlines her journey from Apprentice Project Manager to her current role - along the way obtaining a degree in Construction Management and...
Luca Simonelli, Senior Vice President Channel & Global Alliances at GCX, explains the move toward converging underlay and overlay models, and how this is shaping unified networking and security delivery. He...
Andy, Data & AI Director at Pax8, explores what the agentic inflection point means in practice and how AI is moving beyond experimentation into real-world application. He breaks down the 'empty box' approach...

Expert Opinions

Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...
By Jamie Woodhall, UK Technical and Innovations Manager at Rentokil Specialist Hygiene.