cPacket enhances forensic analytics

cPacket has added its new cStor high speed recording technology to its cVu performance monitoring tools to build a forensic analysts suite

Read More
US banks take Trustwave and Target to court

In the aftermath of the major security attack on the Target supermarket chain in the USA, two banks are suing Target and Trustwave for damages following alleged multiple failings in PCI-DSS compliance testing

Read More
Service Level Agreements und Cloud Computing

SLAs als Schlüssel zur Cloud von Diethelm Siebuhr, CEO der Nexinto Holding

Read More
Doubts exist about new GSC security labelling scheme

It is said to be, in many ways, a good simplification of the old GPMS system that will help take it into business markets as well as Government, but it has some weak-spots that will not help improve security in some areas

Read More
Confidential sharing for enterprises and governments

Making information both available to share with the right people, but secure from the eyes of all...

Read More
Microsoft case shows users must watch those Ts & Cs

The fact that Microsoft read the Hotmail emails of a US blogger to find evidence against an...

Read More
Silver Peak stellt WAN-Optimierung für Equinix Performance Hub zur Verfügung

WAN-Optimierungslösungen von Silver Peak bieten Kunden von Equinix Performance Hub eine...

Read More
Coming standards for mobiles combine ID security and ease of use

NAPPS and SCIM are two new standards due to appear over the next eighteen months which will both...

Read More
Arbor applies analytics to security

Available as a cloud-delivered service or for on-premise use, Arbor’s Pravail Security...

Read More
Skybox offers free threat data

Information on the latest security threats that can help users identify and quantify the...

Read More
Morrison theft shows insider hacks a security weakpoint  

Comments from security industry specialists suggest that there are ways of guarding businesses...

Read More
Think mashup says Go Daddy’s Irving

The CEO of CSP Go Daddy got evangelistic at the Parallels Summit about the opportunities that...

Read More
F5 erweitert Synthesis-Architektur mit höherer Absicherung für das Web und erweitertem Schutz vor Betrug

Die neuen Lösungen bieten Unternehmen einen breitgefächerten Schutz für Netzwerke,...

Read More
Tools to help with new NIST framework

Promontory provides tools to exploit the new US cyber-security standards that help financial...

Read More
Sophos gets UTM to the SMBs

Unified Threat Management is normally considered a tool for the large enterprise, no matter how...

Read More

Videos

Andy Bevan, Head of Propositions and Strategy Consulting at Daisy Corporate Services, discusses recent research findings which reveal that two-thirds of IT leaders say that legacy infrastructure is creating a...
Jamie Akhtar, Co-Founder and CEO at CyberSmart, discusses the importance of cybersecurity solutions developed specifically for the SME market and the benefits they can bring to both the Channel and end users...
Chris McKie, VP, Product Marketing Networking, Security & Risk Management Solutions, Kaseya, discusses the findings of the company’s recently published 2024 MSP Benchmark Report, with automation,...
Stephen Douglas, Head of Market Strategy at Spirent, discusses the company’s 5th annual 5G outlook report, which finds that 5G Standalone (SA) market is picking up significant speed, alongside similar...

Expert Opinions

By Carl Peters, European VP Solutions Engineering at Zayo Group.
Gordon Johnson, Senior CFD Manager at Subzero Engineering, addresses the potential risk of data centers becoming stranded assets due to their power-intensive nature. As data centers increasingly handle...
By Ian Ray, Head of Data, AI and ML, Daemon.
By Kelley Mullick, Vice President of Technology Advancement and Alliances, Iceotope.