Erhöhte Nachfrage nach verbessertem Austausch großer Mediendateien treibt Entwicklung des Cloud Content Exchange von Level 3 voran

Neuer, cloudbasierter Service ermöglicht Radio- und TV Sendern sowie Medienunternehmen weltweit die Übertragung großer Dateien mit hoher Bandbreite in Echtzeit

Read More
Syncsort Data Protection heißt jetzt Catalogic Software™ Innovationen für intelligentere Datensicherung

Catalogic Software, Pionier im Bereich intelligente Datensicherung und -verwaltung, hat sich als...

Read More
GID auf der CeBIT: Wissen bewahren – Zukunft sichern 

Unter dem Motto „Wissen bewahren – Zukunft sichern“ präsentiert sich die...

Read More
Arbor-Sicherheitsbericht 2013:

Dramatische Zunahme von hochvolumigen DDoS-Angriffen, APTs und Angriffen auf mobile Netzwerke

Read More
GP practices: good overall compliance with Data Protection Act, but still areas to improve on

A report published by the Information Commissioner’s Office (ICO) today has highlighted the...

Read More
36% increase in Advanced Persistent Threats

Arbor Networks, Inc. has released its 9th Annual Worldwide Infrastructure Security Report (WISR)...

Read More
Blackholing beats the hackers

FireHost has announced trends for the attacks it blocked from its clients’ web applications...

Read More
Corporate and employee naivety is placing organisations at risk

Absolute Software releases the results of its Mobile Enterprise Risk research.

Read More
A fifth of UK organisations do not provide IT security training for staff

Survey reveals UK office workers do not understand basic security threats and organisations are...

Read More
ManageEngine debuts Cisco AVC Monitoring, iPad App, network security fortifications

ManageEngine has announced a suite of upgrades that are immediately available for key applications.

Read More
Accenture Technology Vision 2014 identifies six IT trends driving digital power shift

Mastering digital technologies becoming essential core competency for companies to compete.

Read More
Big business fails to get to grips with big data, says KPMG

An overwhelming majority of senior executives across the world’s largest organisations accept...

Read More

Videos

Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
DCW Asia 2025 - Part 2 of 3
Work AI leader Glean has launched the Work AI Institute, a first-of-its-kind research initiative - supported by faculty from Stanford, Harvard, Berkeley, Notre Dame, and others - dedicated to decoding what...
In this interview, Dave Baggett, SVP/GM Security Suite at Kaseya, discusses how MSPs can tackle rising complexity, manage vendor sprawl, and stay ahead of high-impact incidents. We explore Kaseya’s unified...

Expert Opinions

By Haris Pylarinos, Founder and CEO of Hack The Box
By Alistair Barnes, Head of Mechanical Engineering at Colt Data Centre Services.
By Nico Gaviola, Vice President, Emerging Enterprises and Digital Natives, Databricks.
By Fernando Rionegro, Vice President, Cloud and Network Services, Europe at Nokia.