cPacket enhances forensic analytics

cPacket has added its new cStor high speed recording technology to its cVu performance monitoring tools to build a forensic analysts suite

Read More
US banks take Trustwave and Target to court

In the aftermath of the major security attack on the Target supermarket chain in the USA, two banks are suing Target and Trustwave for damages following alleged multiple failings in PCI-DSS compliance testing

Read More
Service Level Agreements und Cloud Computing

SLAs als Schlüssel zur Cloud von Diethelm Siebuhr, CEO der Nexinto Holding

Read More
Doubts exist about new GSC security labelling scheme

It is said to be, in many ways, a good simplification of the old GPMS system that will help take it into business markets as well as Government, but it has some weak-spots that will not help improve security in some areas

Read More
Confidential sharing for enterprises and governments

Making information both available to share with the right people, but secure from the eyes of all...

Read More
Microsoft case shows users must watch those Ts & Cs

The fact that Microsoft read the Hotmail emails of a US blogger to find evidence against an...

Read More
Silver Peak stellt WAN-Optimierung für Equinix Performance Hub zur Verfügung

WAN-Optimierungslösungen von Silver Peak bieten Kunden von Equinix Performance Hub eine...

Read More
Coming standards for mobiles combine ID security and ease of use

NAPPS and SCIM are two new standards due to appear over the next eighteen months which will both...

Read More
Arbor applies analytics to security

Available as a cloud-delivered service or for on-premise use, Arbor’s Pravail Security...

Read More
Skybox offers free threat data

Information on the latest security threats that can help users identify and quantify the...

Read More
Morrison theft shows insider hacks a security weakpoint  

Comments from security industry specialists suggest that there are ways of guarding businesses...

Read More
Think mashup says Go Daddy’s Irving

The CEO of CSP Go Daddy got evangelistic at the Parallels Summit about the opportunities that...

Read More
F5 erweitert Synthesis-Architektur mit höherer Absicherung für das Web und erweitertem Schutz vor Betrug

Die neuen Lösungen bieten Unternehmen einen breitgefächerten Schutz für Netzwerke,...

Read More
Tools to help with new NIST framework

Promontory provides tools to exploit the new US cyber-security standards that help financial...

Read More
Sophos gets UTM to the SMBs

Unified Threat Management is normally considered a tool for the large enterprise, no matter how...

Read More

Videos

Chris Gilmour, CTO of Axians UK, explains how Axians, the ICT brand of VINCI Energies, and Nokia are deepening their strategic collaboration to drive the next phase of communications infrastructure and mobile...
Richard Jelbert, CEO of Cyberrock, discusses how, in today’s fast-changing digital landscape, businesses of all sizes face relentless cyber threats often without the dedicated resources or in-house expertise...
Irvin Shillingford - Regional Manager Northern Europe at Hornetsecurity, discusses the results from the company's annual Ransomware Impact Report, with a rise in ransomware attacks the headline finding. Irvin...
Dan Schiappa, President of Technology and Services at Arctic Wolf, discusses the results of the company’s 2025 AI report, which reveals that AI is rapidly becoming a cornerstone of modern cybersecurity, but...

Expert Opinions

By Jon Healy, Managing Director, EMEA, at Salute.
In this second instalment of our two-part series, Justin Day, Chief Product Officer at Cloud Gateway, shares practical strategies to assess your readiness and successfully bring NaaS into your organisation in...
By Niklas Lindqvist, Nordic General Manager at Onnec.
By Riley Peronto, director of product and solution marketing, Chronosphere.