DDoS attacks resemble Advanced Persistent Threats in sophistication

Imperva has released its Q2 2015 Global DDoS Trends Report. The report findings, based on over 3,000 mitigated DDoS attacks and 60 million blocked bot sessions across all sites which were protected using Imperva Incapsula, show a high frequency and long duration of DDoS attacks against...

Read More
Disagreement over security objectives

According to findings from a new global Ponemon study: “2015 Global IT Security Spending & Investments” IT security and IT leaders and their staff members do not agree on security objectives. The study, commissioned by information security leader Dell SecureWorks, surveyed 1,825 IT...

Read More
Data loss due to IT administrator oversights may heighten information security risks

Complex enterprise storage environments call for more thorough backup protocols and investment in technology safeguards.

Read More
Centec to unveil GoldenGate terabit switch reference design

New reference design based on Centec’s GoldenGate terabit switch speeds time to market for...

Read More
Increase network uptime at branch offices and remote sites

The new solutions feature Smart OOB and Failover to Cellular for improved network resilience.

Read More
MapR to offer cloud-based Hadoop with Microsoft Azure

Collaboration provides enterprise-grade Hadoop on-demand in the public cloud.

Read More
Cisco delivers broad solution portfolio for Software Defined Networks

Cisco has announced new capabilities to enhance its comprehensive SDN strategy. Cisco continues to...

Read More
Mid-market opportunity ripe for hyperconvergence

Small to mid-sized companies struggle with storage complexity, data center complexity, cost, and...

Read More
Cavium introduces low power 16-core OCTEON® III SoC processors

SoC sets new standards for control plane, data plane performance for new class of applications...

Read More
NVM Express holds its first all-member meeting

NVM Express, Inc., the organization that developed the NVM Express specification for accessing...

Read More
Automating network vulnerability detection and security policy enforcement

SolarWinds has introduced enhancements to SolarWinds Network Configuration Manager (NCM), its...

Read More

Videos

Nancy Hammervik, Chief Channel Officer at GTIA, shares insights from 40 years in the tech channel. She explains how community, mentorship, and a “member-first” mindset drive real impact in the industry....
In this interview, Francisco Ordillano, Founder (DE) & Founding Partner (UK) at CyberPlus, discusses why secure remote access has become a critical control point for modern organisations. He explores how...
In this interview, Gal Yosef, Director of Solution Engineering at AlgoSec, discusses how AI is reshaping both cyber threats and defences, and why visibility, policy enforcement and operational discipline are...
Paul Christensen, Macquarie Data Centres General Manager, discusses the company’s 47MW IC3 Super West Sydney AI data centre, in the context of its plans to build out some 200MW of AI and cloud capacity in...

Expert Opinions

By Arun Manoharan, Global Head of Strategy Enablement, UBDS Digital.
By Alistair Barnes, Head of Mechanical Engineering at Colt DCS.
By Sujatha S Iyer, Head of AI Security at Zoho Corp.