Report highlights data protection challenges for fostering and adoption agencies

A report published by the Information Commissioner’s Office (ICO) has highlighted the challenges independent fostering and adoption agencies are facing when looking after sensitive personal information.

Read More
Akamai Kona Site Defender erzielt bei der Erkennung von Web-Attacken eine Trefferquote von 96 Prozent

Mit der neuen Version von Kona Site Defender verbessert Akamai die Websicherheit noch einmal deutlich. Die Basis dafür bildet eine Kombination der Daten der Akamai Intelligent Platform mit denen eines umfangreichen Test-Frameworks

Read More
WeSecure helps Heemskerk save time and money

Varonis Systems, Inc. is working with the leading security integrator WeSecure to help Heemskerk dramatically reduce its expensive storage overheads. In parallel, the Netherlands municipal is streamlining its data permissions, and reducing complexities, as it prepares to upgrade to Microsoft Active...

Read More
Avnet Technology Solutions UK collaborates with international law firm

Simmons & Simmons hosts Avnet’s first FinancialPath™ University event in London.

Read More
Prolexic warns of cyber attackers targeting stock prices

Prolexic Technologies has shared an analysis of nearly a dozen global DDoS attacks that indicates...

Read More
Silver Peak counters eavesdropping on corporate networks

Silver Peak has combined the best of site-to-site VPN security and WAN optimisation to deliver...

Read More
Improvements to Akamai Kona Site Defender

Combination of data from Akamai Intelligent Platform and new testing framework improves security...

Read More
Lancope delivers operational network security and visibility

New capabilities bring users closer to the right data at the right time for vastly improved network...

Read More
Firms risk permanent damage to their reputation with security savvy public

Businesses must make data protection their top priority in 2014 in the light of high profile data...

Read More
Bitdefender’s cybersecurity predictions for 2014

With 2014 now in full swing, Catalin Cosoi, Chief Security Strategist at Bitdefender, draws on his...

Read More
Novell increases investment in ZENworks portfolio

Company to acquire full breadth of product offering through the purchase of source code from SECUDE.

Read More
BYOx threatens to disrupt the IT landscape

SolarWinds has released the results of its New IT Survey-, which sheds light on the evolving role...

Read More
WatchGuard Technologies extends real-time network security visibility tool

WatchGuard Dimension now includes unlimited scalability and availability, intuitive reporting...

Read More
Trusteer partners with California State University

Trusteer has completed a five week research study on computer malware with 10 student interns at...

Read More

Videos

Rakesh Parbhoo, Executive Vice President Middle East and Africa at Westcon-Comstor, outlines how the company is marking its 40th birthday by sharing key channel trends and a future-ready vision. Hybrid IT,...
Joe Capes, CEO of LiquidStack, outlines the thinking behind the launch of the company’s GigaModular™ CDU - the industry’s first modular, scalable Coolant Distribution Unit with up to 10MW cooling...
Sophie Cheng, Sinch’s SVP of Product Marketing, discusses the findings of the company’s recent report, the state of customer communications, which explores how brands are adapting their engagement...
Meredith Kendrick, Product Line Manager at AFL, explains the company’s DENALI platform – with a particular focus on how it supports increasing fibre density demands in rapidly evolving, GPU-intensive fibre...

Expert Opinions

By Stuart Farmer, Sales Director at Mercury Power.
In the rush to embrace cloud-first strategies, data security has become dangerously misunderstood, and the result is a fragmented, chaotic environment that’s starting to feel like the Wild West.
By David Higgins, Senior Director, Field Technology Office, CyberArk.
By Matt Sherwen, Managing Director of Sherwen Studios.