Cyber attacks on trust expose UK organizations to £247 million in losses reveals Ponemon and Venafi research

Mismanagement of millions of cryptographic keys and digital certificates threatens security and operations of UK businesses.

Read More

35% of businesses experienced a DDoS attack in 2012

When DDoS (Distributed Denial of Service) attacks hit, organizations are thrown into crisis mode. From the IT department to call centers, to the boardroom and beyond, it’s all hands on deck until the danger passes. In February 2013, Neustar, a trusted, neutral provider of real-time information and analysis, surveyed 704 IT professionals across North America and Europe to understand how companies are managing the crisis around DDoS attacks and measuring the impact on their businesses.

Read More

CA Technologies addresses critical DevOps challenges

CA Technologies is rapidly expanding its market-leading CA LISA® solutions to address the most critical challenges in operationalizing DevOps methodologies, helping customers improve application development and delivery to accelerate innovation. As part of this initiative, the company announced it acquired Nolio, bringing continuous delivery capabilities to CA Technologies service virtualization business. Terms of the transaction were not disclosed.

Read More




Infinidat has introduced an accreditation program to help equip and advance its channel partners...
Cripps LLP has deployed the Nimble Storage Adaptive Flash platform - a transition from legacy...
Precision knife manufacturer adds to Veeam and iland data protection strategy with new cloud-based...
Data-centric organisations in healthcare, financial, and travel services trust Scality RING as the...
Continental and NVIDIA build a high-performance cluster based on NVIDIA DGX AI systems, set to...
Dalrada is collaborating with Lenovo for its computing power and with Iceotope to provide a 360º...
Latest Video

Technical Discussion: Encryption and Security at High Speed over Distance for IP Storage

Why do so many IP replication solutions lack encryption capabilities, and why is performance an issue when you need to encrypt data inflight? Check out Brocade subject matter experts discussing the challenges of maintaining security while replicating data between data centers at high throughput, including how Brocade addresses this architecturally with IP Extension.

Read more