Der Spion in der Hosentasche: Juniper Networks warnt vor Hackern mit unternehmerischem Erfindungsreichtum – Gefahren für Mobilfunknutzer nehmen deutlich zu

Das Angebot an Schadsoftware für Handys wächst weiter rasant. Für Hacker entwickelt sich das illegale Treiben zu einem immer profitableren Geschäftsmodell. Das sind die zentralen Ergebnisse des dritten jährlichen Mobile Threats Reports, den Juniper Networks, der...

Read More
Lancope’s StealthWatch System selected for Cisco SolutionsPlus Program

A key component of the Cisco Cyber Threat Defense (CTD) Solution, StealthWatch delivers market-leading network visibility and security intelligence for improved incident response.

Read More
Web apps still a cause for concern

The third annual Web Application Vulnerability Report from Context Information Security shows that...

Read More
Mcafee completes tender offer of stonesoft

Makes next generation firewall immediately available.

Read More
Fighting fire with fire

By Leon Ward, Director of Product Management, Sourcefire.

Read More
SMEs ‘have the edge’ in digital transformation

Small firms leading the way with digital progress.

Read More
Warrington and Halton Hospitals NHS Foundation Trust prepares for spring clean with new archiving solution

Systematic tiering of data ensures crucial patient information is quickly available at the point of...

Read More
DEVK entscheidet sich in Kfz-Sparte für drebis

Mandatsbeauftragungen und Schadenkommunikation laufen ab sofort über Softwareplattform von...

Read More
Fehlerhafte Datensicherungen in KMU führen zum Verlust unternehmenskritischer Informationen und Umsatzeinbußen

GFI-Studie: Fast ein Drittel der KMU testet ihre Backup-Lösungen nicht auf Zuverlässigkeit

Read More
AppRiver releases mid-year Global Threatscape Report

AppRiver has released its mid-year Global Threatscape Report, a detailed analysis of web and...

Read More
Failing integration projects causing delays and holding back business innovation

Searching data could hold key to improved customer service, say 84% of IT managers.

Read More
More than 40% of companies have inadequate real-time breach detection capabilities

With security breaches being a certainty, it makes great practical sense to have a “Plan...

Read More

Videos

Irvin Shillingford - Regional Manager Northern Europe at Hornetsecurity, discusses the results from the company's annual Ransomware Impact Report, with a rise in ransomware attacks the headline finding. Irvin...
Francesco Marasco, VP Energy Operations and Sustainability, nLighten, explains why the European data centre provider has published the first ICFEn (Integrated Carbon-Free Energy) scores for its facilities,...
Chris Gilmour, CTO of Axians UK, explains how Axians, the ICT brand of VINCI Energies, and Nokia are deepening their strategic collaboration to drive the next phase of communications infrastructure and mobile...
Nicolas Leszczynski, Principal Solutions Engineer at Riverbed Technology, discusses the findings of the company’s 2025 Future of IT Operations in the AI Era report. Despite record investments, only 12% of AI...

Expert Opinions

By Rob Demain, CEO, e2e-Assure.
By David Davies, Associate Director at Arup.
By Patrycja Sobera, Senior Vice President and General Manager, Digital Workplace Solutions, Unisys.