Imperva discovers emerging attack vector

Imperva, Inc. has released its latest Hacker Intelligence Initiative report, “Assessing the Threat Landscape of DBaaS.” Through an in-depth analysis of malware that used a shared hosting database for its Command and Control and drop server, Imperva discovered a new malware platform for...

Read More
Empowering customers to tackle BYOD, Big Data and security concerns

Dell Software has announced technology innovations that address a host of pressing IT challenges. New solutions and technology integrations within Dell’s mobility/BYOD offerings provide customers the tools to increase workforce productivity, while also ensuring secure control over corporate...

Read More
Stonesoft and Tufin deliver integrated security management

The cyber security expert Stonesoft, a McAfee Group Company, and Tufin Technologies, the market leading provider of Security Policy Orchestration solutions, today announced the completion of the first phase of the integration of their management interfaces. The joint solution combines...

Read More
Interoute attains a combined ISAE 3402 /SSAE 16 Type II assurance report

Interoute has completed the ISAE 3402 and SSAE 16 type II assurance report for its Amsterdam, Berlin, Geneva and London Data Centre operations. The report was completed by PricewaterhouseCoopers (PwC), one of the world’s leading risk assurance consultancies, through a six month sampling audit...

Read More
2014 will be a year of escalation, consolidation, and innovation

International Data Corporation (IDC) has offered the first of its annual predictions for the coming...

Read More
The Road To Hell

"Mama, I come to the valley of the rich Myself to sell" She said "Son, this is the...

Read More
Akamai to acquire Prolexic

Akamai aims to extend its leading Web optimisation and security offerings by adding cloud-based...

Read More
Only 9% of consumers believe organisations are doing enough to keep their data secure

Consumer trust plummets to a ten year low in the wake of data scandals.

Read More
Chester Zoo protects critical IT infrastructure

Intrusion detection and prevention, and application control, add new level of security and...

Read More
Priveleged security at Volkswagen

Volkswagen Commercial Vehicles, part of the Volkswagen AG group, has implemented CyberArk’s...

Read More
Don’t ignore cyber threats

According to new research conducted by the Department for Business, Innovation & Skills (BIS)...

Read More
NTT Com Security empowers businesses to make proactive risk management decisions

MSS meets global demand for advanced information security and risk management capabilities.

Read More
The last rites of traditional IT security

Anti-Virus (AV) software, along with its Firewall side-kick, has been the standard weapon against...

Read More
Malware creation hits record-high numbers in 2013, according to PandaLabs Q3 Report

Malware creation hits record high, reaching 10 million new malware strains identified so far in...

Read More
UK companies must do more to tackle cyber threat

The UK's top companies are not considering cyber risks in their decision making, a new survey...

Read More

Videos

Chris Coward, Director of Project Management, BCS, offers a refreshingly honest view of the ways in which AI is likely to impact the data centre industry over time. He shares some great insights as to how BCS...
Henrik Sandin, Director & Principal ESG Specialist at Workiva, discusses the findings of the company’s recent ESG Practitioner Survey, covering the impending EU Corporate Sustainability Reporting Directive...
Chris Maclean, CEO of Open Energy Market, provides some great insights as to how data centres can leverage energy efficiency and sustainability initiatives not only to meet environmental goals but also to gain...
Leah Goldfarb, Environmental Impact Officer at Platform.sh, explains the importance of being able to identify truly green data centres as organisation’s develop their own sustainability objectives and also...

Expert Opinions

By Michael Lukaszcyk, CEO and co-founder, Hygraph.
By Kelley Mullick, Vice President of Technology Advancement and Alliances, Iceotope.
By Muhammad Yahaya Patel, Security Engineer at Check Point Software.
By Igor Epshteyn, CEO at Coherent Solutions.