Cyber security spending in critical infrastructure to hit $46 bn

  • Published in

ABI Research sees security spending climbing on the back of a pessimistic outlook on security in the cloud

Read More

Log, log and log some more

  • Published in

Tripwire looks to log files as the best source of security and compliance

Read More

Helping ISVs really monetise

  • Published in

The latest version of SafeNet’s Sentinel Cloud gives software vendors a cloud-delivered service that watches all the pennies they might make, and secures the process as well.

Read More

Cyber security, staff and the cock-up theory

  • Published in

Are main board directors concerned about the US NSA and the PRISM program? Not too much, it appears, and the same goes for attacks by criminals or competitors. The big cyber security problem, a survey shows, comes from the staff.

Read More

Cloud can be the basis of flexible working

  • Published in

Survey sponsored by Vodafone points to significant benefits from more flexible working, and how the technology is making it easier for businesses to put it in place.

Read More

Getting a head start in BYOD

  • Published in

The staff may want to bring their own devices, but if the company is not ready or able to exploit it securely and profitably, it may need help from a company like CompuCom

Read More

New data from Synergy Research Group shows that Q2 spend on cloud infrastructure services passed...
East Lancashire Medical Services (ELMS) chooses InTechnology Managed Services (part of Redcentric...
Service providers can now add new hosted private cloud IaaS services on OpenStack using Mirantis...
SMBs (small to medium sized businesses) that have used the power of the Internet to grow their...
CSP certifies against Cloud Industry Forum’s Code of Practice.
Complete facilitation of the data management platform, with 24x7 operations.
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more