Cyber attacks can take months to control even after detection

Advanced cyber attacks being made by state-sponsored cyber terrorists can take months to control even after being detected an IT security company was warned.

Read More

Trotz strenger Vorschriften zur Aktenaufbewahrung agiert jedes dritte europäische Unternehmen nur wenig systematisch

Europaweiter Leitfaden von Iron Mountain und der Anwaltskanzlei De Brauw Blackstone Westbroek soll Unternehmen bei Einhaltung von Aufbewahrungsfristen unterstützen

Read More

IT-Verfügbarkeit: Das Problembewusstsein der Verantwortlichen bleibt ausbaufähig

Eine Studie konnte belegen, dass IT-Ausfälle bei größeren mittelständischen Unternehmen zu hohen Kosten führen, dass sich aber viele IT-Verantwortliche der Risiken kaum bewusst sind. Bei kleineren Mittelständlern ist die Problematik ähnlich: Eine Umfrage von Stratus Technologies zeigte, dass auch hier das Problembewusstsein unzureichend ist

Read More


The Marine Institute discovers greater functionality

Varonis has revealed details of its work with the Marine Institute. With a primary objective to ensure that only authorised people have access to the data that they are meant to have access to; the Marine Institute discovered Varonis DatAdvantage was capable of more than just reporting.

Read More

Double coup for Softcat with advanced Symantec Master Specialist certifications

Softcat has achieved its most advanced Symantec accreditations yet in a leap which cements its Symantec technical consultants as among the best in the country. Symantec awarded Softcat the ‘Master Specialisation in Archiving & E-Discovery’, and ‘Master Specialisation in Data Protection’, in a double coup which not only proves the team’s extreme competence in these disciplines, but also grants them priority access to superior post-implementation technical...

Read More

Cloud computing makes affordable platform for Virtualised Desktop Infrastructure
Trustwave has unveiled a new cybersecurity consulting practice designed to help enterprises...
Spotlight Sessions zu aktuellen CIO-Themen, interaktive Podiumsdiskussionen und spannende...
Top three vectors used to exfiltrate data are database leaks, cloud applications and removable USB...
Banks and merchants are struggling to keep pace with the threat environment, but collaboration is a...
Zerto has introduced Zerto 9, significantly advancing its capabilities in the fight against...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more