Bull signs service contract with the Tele Columbus Group

The five year contract will ensure the stability of IT operations at the Berlin-based cable network company and allow support times to be extended - end customers will benefit.

Read More

The Green Grid takes giant StEP towards e-waste leadership

Collaboration with e-waste think tank aimed at educating organisations on electronic equipment disposal.

Read More

ISACA issues COBIT 5 for Assurance

  • Published in

Establishing confidence in IT processes and controls is important, but audit and assurance processes often represent a pain point for business partners. Their perception is that assurance processes consume resources, slow activities and can lead to additional work—all to achieve goals they may not understand. ISACA’s new COBIT 5 for Assurance bridges the gap by translating assurance activities into a common language that is meaningful to business and technology partners and ties...

Read More

Chip-to-application transformation

  • Published in

McAfee introduces two new suites: McAfee Complete Endpoint Protection – Enterprise, and McAfee Complete Endpoint Protection – Business. These suites are the first to link security from chip to OS to applications, protecting against new threat vectors and bringing critical visibility to risk management. The suites are the first to include McAfee Deep Defender, a rootkit protection based on hardware-enhanced security jointly developed by Intel and McAfee, dynamic whitelisting, risk...

Read More

Simplifying mobile security

  • Published in

McAfee has announced that McAfee Enterprise Mobility Management (McAfee® EMM™ software) is now fully integrated with the McAfee®ePolicy Orchestrator® (McAfee ePO™) platform. With McAfee EMM software, comprehensive security, policy, and management capabilities are extended to mobile devices. McAfee ePO software enables enterprises to protect their data on company-issued and employee-owned devices (smartphones, tablets, laptops, and desktop computers) through a single,...

Read More

Small to mid-sized business IT budgets surge 19 percent

Hardware purchases drive increase in spending; backup/recovery software and tablets show strong growth.

Read More

Security Orchestration, Automation and Response (SOAR) will rocket to address cyber attacks...
DomainTools has released its annual Cybersecurity Report Card in which security analysts, threat...
Top three vectors used to exfiltrate data are database leaks, cloud applications and removable USB...
Leading technology distributor strengthens cloud security and DevSecOps offering with new vendor...
The number of businesses suffering cybersecurity breaches or attacks is on the rise again after...
e92plus and Bitglass, the Total Cloud Security company, have formed an agreement to offer...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more