LogRhythm kommentiert: IT-Security von Kraft- und Wasserwerken ist nicht sicher

Deutsche Firmen und Einrichtungen rücken immer stärker in den Fokus von Hackern. Das Bundesamt für Sicherheit in der Informationstechnik (BSI) warnt seit langem vor massiver Cyber-Spionage

Read More
25 percent of breaches go undetected for more than 24 hours

Tripwire, Inc. has announced the results of a survey conducted by Atomic Research and sponsored by Tripwire of 102 financial organizations and 151 retail organizations in the U.K., all of which process card payments. The survey results indicate that recent data breaches have had little impact on...

Read More
Research reveals that some “advanced” threats are actually simple to execute

Imperva Inc. has released its April Hacker Intelligence Initiative report, "The Non-Advanced Persistent Threat." The report presents an in-depth view of how some techniques attributed to so-called Advanced Persistent Threats (APTs) require only basic technical skills. The report exposes...

Read More
LogMeIn acquires Ionia

LogMeIn, Inc. has acquired Ionia Corporation, a system integrator specialising in connected solutions. The move is part of a larger strategy to accelerate LogMeIn’s IoT opportunity by helping early customers of its Xively Cloud Services platform quickly go to market with their connected...

Read More
The desk is dead! Long live the desk!

Rise of mobile devices is adding to workplace pressure, but the office remains King when it comes...

Read More
Fujitsu acquires GlobeRanger

Acquisition supports Fujitsu Global Defence Initiative, bringing secure solutions in an ever...

Read More
Wearable technologies can boost employee productivity by up to 8.5%

Wearable technologies have been found to boost employee productivity by 8.5%, experts from...

Read More
Lancope expands Global Secure Partner Programme

Secure Partner Program enables resellers to deliver in-depth network visibility and security...

Read More
Akamai Media Cloud Workflow erfüllt die MPAA-Sicherheitsanforderungen

Durch den integrierten DRM-Schutz in Studioqualität, wie ihn die Urheberrechtsvorgaben der...

Read More
94 percent of IT security professionals using third party apps on their mobiles

New poll shows rise in cloud-based and mobile apps employees is creating more islands of identity...

Read More
Spirent brings vulnerability scanning and load testing on a Cloud-based platform

ArmorHub and Blitz.io make Website and Application development fun, easy and inexpensive for anyone...

Read More
C2C announces availability of Compliance365

New offering gives Office 365 users better control over secured archives.

Read More
Orange Business Services and Sia Partners analyse new ways of working in the digital era

Orange Business Services and the consultancy Sia Partners have released a position paper which...

Read More
iboss Network Security tracks data flow

Advanced behavioural data analysis detects threats through anomalies in data movement.

Read More

Videos

Michael Anderson, VP, Business Development at Abstract Security, discusses the launch of the company’s PAINT Partner Program (Partnerships, Alliances, and INTegrations), designed to empower resellers, MSPs,...
Micheal McCollough, Senior Vice President of Worldwide Partners & Alliances, Mimecast, discusses his new role at the company, where he will lead the evolution of Mimecast’s Channel and MSP programmes, expand...
David Rimmer, Microgrid Business Leader UK&I at Schneider Electric, outlines the ways in which data centre microgrid deployments can contribute to energy cost savings, energy resilience and independence, and...
Adam Salley, Sr. Director, Solutions Specialists, Kaseya, examines the shift to cloud workloads and as well as the importance of commercial flexibility.

Expert Opinions

By Darin Patterson, VP of Market Strategy at Make.
By Manuel Sanchez, Information Security and Compliance Specialist, iManage.
By Kevin Hexley, Chief Technical Architect, Systal Technology Solutions.