Crime as a Service in a cloud near you

According to research undertaken by McAfee VP, Raj Semani, the `as-a-Service’ business model has been taken up by cybercriminals

Read More

Cloud contracts ‘need more transparency’

Buyers of commercial cloud services, especially software as a service (SaaS), are finding security provisions inadequate. Gartner, Inc. said SaaS contracts often have ambiguous terms regarding the maintenance of data confidentiality, data integrity and recovery after a data loss incident. This leads to dissatisfaction among cloud services users. It also makes it harder for service providers to manage risk and defend their risk position to auditors and regulators.

Read More


Offshore providers without a Cloud strategy risk long-term future

While the increased use of industrialised services will reduce the volume of traditional and customised services, the impact on offshore providers will be counterbalanced by new revenue from investments in cloud-based services, said Gartner, Inc. However, service providers that are slow, unable or unwilling to invest in the shift to the cloud will risk hampering offshore services revenue growth.

Read More

Flexiant Cloud Orchestrator V3.1.3 released

Latest version extends storage capabilities and enhanced dynamic workload placement to support a variety of cloud service providers’ different business requirements.

Read More


As business and IT finally align on security priorities, companies throw technology at issues,...
Native integration of Qualys Cloud Agent streamlines security assessment across Azure virtual...
67 per cent of IT pros believe they could be bringing greater innovation to their organisation...
SUSE also expanding partner services and support in SUSE Cloud Service Provider program.
New unit eases access for customers to unique capabilities of Sec-1 and NotSoSecure.
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more