McAfee Labs has released the McAfee Labs Threats Report: August 2014, revealing that phishing continues to be an effective tactic for infiltrating enterprise networks.
Read MoreCisco has introduced significant innovations to its Unified Computing System™ (UCS), delivering a broader and more powerful portfolio of technologies to help customers capitalise on rapidly changing landscapes in business and IT.
Read MoreImperva Inc. has announced the availability of SecureSphere Support for Cloudera. Imperva’s product portfolio protects applications and data across repositories, including structured, semi-structured, unstructured and cloud. With SecureSphere Support for Cloudera, organizations can mitigate costly non-compliance fines and protect against data breaches as they leverage Big Data deployments to deliver business value.
Read MoreDell advocates the use of secure enterprise workspaces in BYOD environments to help organisations balance employee expectations, business goals, IT requirements and security needs. Today, a plethora of options exist for providing employees with the software and other enterprise resources needed to do their jobs. A secure workspace, however, is the most effective approach for accommodating employees’ needs for anywhere, anytime access to corporate data and resources while also elevating...
Read MoreThe EU is to impose new data protection legislation to ensure better protection of the personal information of all EU citizens. The reforms will come with more severe fines for organisations that suffer data breaches. Peter Groucutt, managing director at Databarracks, claims that this is the tool IT professionals can use to drive-through security changes, as failure to do so will now result in severe repercussions: “Often, the fines imposed on organisations that suffer data breaches are...
Read MoreBlue Coat Systems, Inc. says that 71 percent of hostnames appeared for just 24 hours. While the majority of these “One-Day Wonders” are the backbone for how Internet content is shared and delivered, the sheer volume provides cover for malicious activity, including communication to infected systems.
Read More