Commercial data security getting tougher as cyber attacks get super-smart

Cyber criminals are systematically testing businesses digital defences in order to steal financial and commercial information in greater numbers than ever using super-sophisticated software.

Read More
HP bringt Next-Generation Firewall

- Neue Firewall von HP TippingPoint inspiziert bis zu zehn Gigabit Daten pro Sekunde - Neue Online-Plattform HP Threat Central sammelt IT-Sicherheitsinformationen durch Crowdsourcing

Read More
F5 Networks erwirbt Versafe und unterstützt so seine Kunden beim Schutz vor Online-Betrug

F5 Networks gab die Übernahme der Versafe Ltd. bekannt. Mit der Übernahme erweitert F5 sein Produktportfolio mit Web-Anti-Fraud-, Anti-Phishing und Anti-Malware-Lösungen. Die Kombination der Web- und Mobile-Lösungen mit den Security Operation Centers (SOC) ergänzt die vorhandenen Sicherheitslösungen von F5 Networks

Read More
Virtual Panda thrives in the cold

Logistics provider Peter Green Chilled offer Temperature Controlled services to the food industry supplying to the major retailers – including Tesco, Asda and Sainsbury's.

Read More
GFI Software launches GFI LanGuard 2014

To meet increasing threat levels, GFI expands GFI LanGuard’s vulnerability assessment capabilities to include mobile operating systems, Linux distributions, and even more third-party applications.

Read More
100% of commuters put company data at risk over free public Wi-FI

Commuter study reveals commuters regularly connect to free, unsecure Wi-Fi services during their daily journey, putting personal and company data at risk every week.

Read More
ISACA releases “Configuration Management: Using COBIT 5” to help businesses manage change

Change can cause business disruptions, inefficiencies and financial losses. Proper configuration management (CM) reduces the risk of malfunctions and increases efficiency during times of IT-related change. To help enterprises implement effective CM, global IT association ISACA has released a new guide, Configuration Management: Using COBIT 5.

Read More
Allianz partners with forensic IT experts

Cyber crime is costing the UK economy £27bn.

Read More
3M study reveals French concerns about shoulder surfing

Survey shows nearly half of French adults are concerned about visual data security; almost two fifths have been able to read others’ confidential information.

Read More
Study reveals “big doubts” over mobile compliance

Only 18 percent of organizations are confident that their mobile policies are compliant with corporate policy and government regulation, according to research released by Accellion, Inc., the pioneer in providing enterprise-class, secure mobile productivity solutions, and AIIM, a global non-profit organization that provides independent research, education, and certification programs to information professionals. In addition, 51 percent of organizations have ‘big doubts’ about their mobile content management processes.

Read More
Lieberman Software and Qualys integration

Lieberman Software Corporation and Qualys, Inc. have announced the integration between Enterprise Random Password Manager (ERPM) and the QualysGuard Security and Compliance Suite, providing customers with secure password management for authenticated scanning for IT security and compliance. Lieberman Software will exhibit this functionality at Qualys Security Conference 2013 in Las Vegas this week.

Read More
Strategic partnership with Ingram Micro UK

Outsourcery plc has agreed a strategic partnership with Ingram Micro UK, a division of Ingram Micro Inc. (NYSE:IM), the largest global wholesaler of technology products and supply chain management services.

Read More
Passive Vulnerability Scanner now available

Drop-in solution identifies security and compliance violations in BYOD, cloud, and Virtual Infrastructure.

Read More
Major vendors and ICT channels come together to address the surge in customer demand for managed services

IT Europa and Angel Business Communications today announced further details of the Managed Services & Hosting Summit which will be staged on 26 September 2013 at the Lancaster London Hotel.

Read More
Five steps to prepare for a DDOS attack

By Sean Leach, Vice President of Technology for Verisign.

Read More

Videos

Elizabeth Green, EMEA Advisory and Cyber Lead, at Dell Technologies, discusses the ever-shifting cybersecurity landscape, where cyber resilience is very much the focus.
Eric Herzog, Chief Marketing Officer at Infinidat, discusses the Brittle, Anxious, Non-linear, Incomprehensible (BANI) challenges facing businesses at the present time, explaining how the company’s innovative storage solutions help to address many of these current cost, staffing and wider cybersecurity, data resilience and sustainability pain points.
DCS talks to David Sanders from atNorth at the Data Centre Alliance's 10x10 Event on 16th February 2023.
Lorraine Wilkinson, Vice President, UK, Equinix, discusses female representation in the technology industry and shares how technology companies can better support their female employees and encourage more women to enter the industry.

Expert Opinions

Josip Rozman, AI consultant at Plextek examines if we should be using AI to write our content.
By Peter Greiff, Data Architect Leader EMEA, DataStax.