Report outlines distinctive national and regional characteristics of nation-state driven cyber attacks

FireEye, Inc. has announced the release of a report titled, “World War C: Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks” that describes the unique international and local characteristics of cyber attack campaigns waged by governments worldwide.

Read More
White Paper ‘quashes’ EMEA data protection law myths

Dell SecureWorks has launched a white paper which seeks to overturn the myths surrounding data protection laws and how organisations can use Managed Security Service Providers (MSSP). In conjunction with law firm Field Fisher Waterhouse, experts in data protection and data security law, Dell...

Read More
Small businesses warned about importance of encryption, after London sole trader fined £5,000

The Information Commissioner’s Office (ICO) has warned small businesses that they must make sure they have adequate measures in place to keep customers’ details secure, after a sole trader was fined £5,000.

Read More
Insurance Giant Allianz partners with Incoming Thought

Cyber crime and data breaches are considered one of the top emerging risks for the 21st century and...

Read More
The security game - is your business fit enough?

Asks Tim Keanini, chief research officer, Tripwire.

Read More
Professionals turn to Cloud-based IT applications

Cloud-based web hosting, backup and security applications see strong adoption levels as IT...

Read More
China Comservice selects Wontok

China Comservice, a leading provider of information and communication technology services in the...

Read More
Employees causing security threats

Nearly 30% of employees are using personal cloud services to store work-related documents,...

Read More
ICO carries resolution encouraging greater co-ordination of global data protection enforcement

The Information Commissioner’s Office (ICO) has won a resolution in Warsaw which is set to...

Read More
Iron Mountain unterstützt Zurich Gruppe Deutschland bei Aktenarchivierung

Iron Mountain lagert über zwei Millionen Akten des Versicherungsunternehmens; Anforderungen an...

Read More
Beobachtung von TCP-Paketen und Serverantworten ermöglicht Rückschlüsse auf die Leistung von Web-Applikationen 

Neuer Passive Application Performance Sensor: Mit PRTG Network Monitor Server und Services ohne...

Read More
Professionell auf Cisco CCNA- und CCNP Security-Zertifizierungen vorbereiten

Cisco Security-Trainings-Special bei Fast Lane: Kurs buchen und Test-Voucher dazu erhalten 

Read More
Acronis mobilEcho® 4.5: Neue Maßstäbe für sicheres BYOD

Acronis® hat heute die Einführung von mobilEcho® 4.5 bekannt gegeben. Die neue Version...

Read More

Videos

Rob Finn, VP International Sales at Chainguard, discusses the company’s new Global Partner Program, offering flexible incentives, technical enablement, and go-to-market support to empower channel resellers...
Adam Salley, Sr. Director, Solutions Specialists, Kaseya, provides a comprehensive, insightful overview of the many topics and technologies impacting the Business Continuity Disaster Recovery (BCDR) landscape...
Ciaran Flanagan, Global Head of Data Center Solutions at Siemens, explains the decision for Siemens Smart Infrastructure to open a data centre technology hub in the Iberian region, before going on to discuss...
Dr. J Metz, SNIA Chair, explains how AI workloads are extraordinarily complex and constrained by issues related to latency, space, power and cooling, memory, and cost and how addressing these problems through...

Expert Opinions

Carlos Buenano, CTO for OT at Armis, outlines how cyber exposure management is reshaping protection strategies for remote and critical systems.