Hyve, a leader in business hosting solutions, selected Corero’s First Line of Defense solution to safeguard its clients against Distributed Denial of Service (DDoS) attacks and other unwanted traffic to ensure availability.
In einem neuen Handbuch der NATO wurde nun ein Verhaltenskodex für die Kriegsführung im Cyberspace festgehalten. In dem Dokument wird unter anderem vor Cyber-Angriffen auf kritische Infrastruktureinrichtungen wie Krankenhäuser oder AKWs gewarnt, die zwar als militärische Ziele festgelegt sein können, bei deren Abschaltung, Beschädigung oder Zerstörung aber mit hohen Opferzahlen zu rechnen ist.
HP has been selected by DreamWorks Animation SKG, Inc. (Nasdaq: DWA) to deliver the technology behind “The Croods,” pushing the boundaries of modern imagery for this prehistoric animated adventure that is anything but primitive.
GFI Software plant die Ausgliederung des Security-Technologie-Geschäftsbereichs mit seiner VIPRE Familie von Antivirus-Produkten und seinen Anti-Malware-Lösungen SandBox und ThreatTrack und gründet ThreatTrack Security Inc.
Big data can save big money. A recent McKinsey report found that value gained from data in the US health care sector alone could be more than US $300 billion every year. But traditional tools aren’t enough to manage these extremely large amounts of fast-changing information. To help enterprises use big data effectively, global nonprofit IT association ISACA issued guidance today on how to manage the chaos and address the business benefits and challenges.
Last year was the worst for IT services contract activity since 2002, according to research from Ovum. Performance in the three months to the end of December 2012 fell well below the levels seen in the same period of 2011, ensuring that annual IT services contract activity fell to its lowest level for 10 years, both in terms of total contract value (TCV) and deal volume.
Dataguise has announced the results of a recent survey on the importance of securing sensitive data in Apache Hadoop environments. The study was conducted at the O’reilly Strata Conference and the RSA Conference where survey participants highlighted the need to secure sensitive information in Hadoop deployments, reducing the risk for non-compliance.
InfoWatch Research Center has released its latest annual report on worldwide data leaks reported by the press during 2012. According to InfoWatch analysts, more than 1.8 billion records were compromised in 2012, including those containing financial and personal data. The press reported 934 confidential information leaks, a 16% increase compared with last year. Direct losses – those that were published in open sources – alone amounted to more than 37.8 million dollars.
David Ellis, Vice President, Security and Mobility Solutions, Tech Data EMEA, talks through the challenges and opportunities for the Channel as digital transformation and, in particular, the rapid hybrid workplace evolution, place ever greater emphasis on the need for cybersecurity to be front and centre in almost any technology solution.
Mark Jow, EMEA Vice President - Sales Engineering, Commvault, talks through the success of the company’s Metallic Software-as-a-Service Backup offering, a year on from the European launch, as well detailing the AWS availability of Commvault Backup & Recovery, and providing some great insight into a recent customer win at Syncreon.
Richard Clifford, Head of Innovation at Keysource, talks through some of the company’s recent customer success stories, its new cybersecurity focus, and goes on to provide some great insights into the data centre sustainability debate – with Scope 3 emissions and supply chain collaboration a major focus, alongside hybrid cooling and the edge. Richard also suggests that it might be time to move beyond the PUE metric as a measure of data centre energy efficiency.
Sudheer Matta, Vice President Product Management AI Driven Enterprise, Juniper Networks, shares some insights from the company’s recent virtual summit – Driven By Experience. A key theme was the importance of using a combination of data and AI, including AIOps, to help improve network resilience, reliability, security and, ultimately, performance.
If you’re in the business of data, you’ll know that it’s a valuable asset that must be protected. You’ll also be acutely aware that wherever there is data, there is risk, and not just to your data. Physical security – the protection of people, property and assets should also be considered for their potential vulnerabilities.
By Steve Mansell, Divisional Director Critical Facilities, Zumtobel Group