DDoS attacks resemble Advanced Persistent Threats in sophistication

Imperva has released its Q2 2015 Global DDoS Trends Report. The report findings, based on over 3,000 mitigated DDoS attacks and 60 million blocked bot sessions across all sites which were protected using Imperva Incapsula, show a high frequency and long duration of DDoS attacks against...

Read More
Disagreement over security objectives

According to findings from a new global Ponemon study: “2015 Global IT Security Spending & Investments” IT security and IT leaders and their staff members do not agree on security objectives. The study, commissioned by information security leader Dell SecureWorks, surveyed 1,825 IT...

Read More
Data loss due to IT administrator oversights may heighten information security risks

Complex enterprise storage environments call for more thorough backup protocols and investment in technology safeguards.

Read More
Centec to unveil GoldenGate terabit switch reference design

New reference design based on Centec’s GoldenGate terabit switch speeds time to market for...

Read More
Increase network uptime at branch offices and remote sites

The new solutions feature Smart OOB and Failover to Cellular for improved network resilience.

Read More
MapR to offer cloud-based Hadoop with Microsoft Azure

Collaboration provides enterprise-grade Hadoop on-demand in the public cloud.

Read More
Cisco delivers broad solution portfolio for Software Defined Networks

Cisco has announced new capabilities to enhance its comprehensive SDN strategy. Cisco continues to...

Read More
Mid-market opportunity ripe for hyperconvergence

Small to mid-sized companies struggle with storage complexity, data center complexity, cost, and...

Read More
Cavium introduces low power 16-core OCTEON® III SoC processors

SoC sets new standards for control plane, data plane performance for new class of applications...

Read More
NVM Express holds its first all-member meeting

NVM Express, Inc., the organization that developed the NVM Express specification for accessing...

Read More
Automating network vulnerability detection and security policy enforcement

SolarWinds has introduced enhancements to SolarWinds Network Configuration Manager (NCM), its...

Read More

Videos

Dan Evans, Associate Director at Lichfields, discusses the results of the company’s recent data centre study, which finds that, for developers, Scotland offers something few regions or countries can match -...
Alex Walsh, Regional VP of Channel Sales, EMEA North at Keepit, discusses the company’s channel-first strategy, broad SaaS data protection, and how MSPs can differentiate amid consolidation and cyber risks,...
Work AI leader Glean has launched the Work AI Institute, a first-of-its-kind research initiative - supported by faculty from Stanford, Harvard, Berkeley, Notre Dame, and others - dedicated to decoding what...
Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.

Expert Opinions

By Eric Herzog, Chief Marketing Officer at Infinidat
By Mark Daley, Director of Digital Strategy and Business Development, Epsilon Telecommunications.
This year is set to be a pivotal year for cloud strategy, with repatriation gaining momentum due to shifting legislative, geopolitical, and technological pressures. This trend has accelerated, with a growing...