Neue 24-Stunden-Meldepflicht für Datendiebstahl stellt besondere Anforderungen an die E-Mail Sicherheit

Mit dem 25. August 2013 ist eine neue Verordnung der Europäischen Union in Kraft getreten, die langfristig Auswirkungen auf die E-Mail Kommunikation aller Unternehmen in der EU haben könnte. Mit der Regelung wird – zunächst für Telekommunikations- und Internet-Anbieter...

Read More
Cyberkriminalität kostet deutsche Unternehmen im Schnitt 5,7 Millionen Euro im Jahr

Cyberkriminalität kostet deutsche Unternehmen im Schnitt 5,7 Millionen Euro pro Jahr - ein Anstieg von 830.000 Euro oder 16 Prozent gegenüber 2012. Das geht aus der aktuellen Ausgabe der jährlichen Studie "Cost of Cyber Crime" hervor, die das Ponemon Institute im Auftrag...

Read More
Softcat cements HP expertise with Platinum Partner status

Softcat has achieved HP’s highest possible accreditation through an on-going concerted resource and training investment. The Platinum accreditation follows a year that has seen Softcat’s revenues leap to £400 million, with HP recognising Softcat for its sales delivery, awarding...

Read More
Beta release of Red Hat Enterprise Linux 6 now available

To keep pace with the demand for enterprise-class infrastructure, the newest version of the leading Linux platform, the beta release of Red Hat Enterprise Linux 6.5, extends its scalability and manageability to aid in the build-out and control of large, complex IT environments. For example, Red Hat...

Read More
Barracuda expands cloud offering on Windows Azure cloud platform

Barracuda provides complete application security and secure remote access to Windows Azure.

Read More
HP enhances Just Right IT Partner Program

NetworkIT and Simply StoreIT programs simplify technology selection for SMB customers.

Read More
Global study shows need for C-level leadership

Capgemini Consulting, in partnership with MIT Sloan Management Review, has announced the findings...

Read More
Corero partners with Neustar

Corero Network Security has entered into an agreement under the Strategic Alliance Program with...

Read More
Enhanced SIEM

McAfee has announced what it says is the industry’s first “endpoint aware”...

Read More
OneLogin raises $13m

OneLogin, the innovator in enterprise identity management, has secured a $13 million round of...

Read More
Becrypt continues innovation

Latest version of Advanced Port Control provides the only CAPS approved Port Control solution for...

Read More
A Secure approach to floating your Private Cloud

How should organisations approach data centre migrations to private clouds, while maintaining...

Read More
Top UK businesses address cyber risks

The UK’s top business leaders are reviewing how well their boards understand cyber security...

Read More
Schneider Electric: Wie sicher ist die Stromversorgung? Blackout beim ZDF - Zuschauer mussten auf Morgenmagazin verzichten

Am vergangenen Mittwoch war beim Sender ZDF Improvisation gefragt: Am frühen Morgen fiel im...

Read More

Videos

Amber Walsh, Senior Analyst at Bluefield Research, discusses the findings of the company’s new report, U.S. Water for Data Centers: Market Trends, Opportunities, and Forecasts, 2025–2030, which reveals...
Avi Baum, CTO at Hailo, discusses why AI infrastructure needs are already shifting from centralized to edge, how telcos can evolve and future-proof their business to keep up with that transition, and what’s...
Michelle Buckingham, VP of Channel at IFS, discusses the company’s recent acquisition of TheLoops and its recent collaboration with TomTom before explaining how IFS is building a digital-first partner...
Alexander Goodall, Founder & CEO at Xela Energy, talks through the company’s rebrand from Clean Energy Capital to Xela Energy, an Enterprise Independent Power Producer (EIPP) and a leading UK provider of...

Expert Opinions

By Krishna Narayanaswamy, Chief Technology Officer (CTO) at Netskope.
By David Knox, Global Director of Energy & Sustainability at Colt DCS.
By Stuart Farmer, Sales Director at Mercury Power.
In the rush to embrace cloud-first strategies, data security has become dangerously misunderstood, and the result is a fragmented, chaotic environment that’s starting to feel like the Wild West.