Symantec Corp.'s Internet Security Threat Report, Volume 18 (ISTR) has revealed a 42 percent surge during 2012 in targeted attacks compared to the prior year. Designed to steal intellectual property, these targeted cyberespionage attacks are increasingly hitting the manufacturing sector as well...
Read MoreDie Bundesrechtsanwaltskammer (BRAK) hat den IT-Dienstleister adesso AG mit den Vorbereitungen zur Einführung des sogenannten elektronischen Anwaltspostfaches beauftragt. Im ersten Schritt werden die Anforderungsanalyse sowie die Kontext- und Systembeschreibungen der geplanten Lösung...
Read MoreFujitsu integriert die branchenführende Deduplizierungstechnologie von Quantum in die neue Generation der Fujitsu ETERNUS CS High End Data Protection Appliance. Unternehmen können damit die Geschwindigkeiten beim Daten-Backup oder bei der Datenwiederherstellung besser mit den Kosten...
Read MoreTrusteer has announced the European launch of Trusteer Apex to protect enterprises against advanced malware attacks and data breaches at this month’s Infosecurity Europe.
Read MoreCloud computing makes affordable platform for Virtualised Desktop Infrastructure
Read MoreNew independent research commissioned by Corero Network Security shows that businesses are more...
Read MoreBy 2015, 10 per cent of overall IT security enterprise product capabilities will be delivered in...
Read MoreBanks trusted by the majority, but supermarkets and social networks least trusted.
Read MoreAvnet Technology Solutions has announced the departure of Fabian von Kuenheim, CEO of Magirus, from...
Read MoreBy Don Jackson, CISSP, a Senior Security Researcher with the Counter Threat Unit (CTUTM) Research...
Read MoreKombination aus sicherem Mobile File Management und App- und Device-Management ermöglicht...
Read MoreTandberg Data, einer der führenden Anbieter professioneller Datensicherungslösungen...
Read MoreHervorragende Leistung bei der Netzwerk-Security-Forensik und beim Netzwerk-Performance-Management
Read MoreThe Open Group announces the publication of the Open Trusted Technology Provider Standard...
Read MoreDeeper privileged user activity and change monitoring speeds threat identification to avoid data...
Read More