Akamai Media Cloud Workflow erfüllt die MPAA-Sicherheitsanforderungen
  • Published in

Durch den integrierten DRM-Schutz in Studioqualität, wie ihn die Urheberrechtsvorgaben der Motion Picture Association of America (MPAA) vorsehen, baut Akamai die Qualität und Skalierbarkeit bei der Auslieferung von Online-Medieninhalten weiter aus. Darüber hinaus hat Akamai ein...

Read More
94 percent of IT security professionals using third party apps on their mobiles
  • Published in

New poll shows rise in cloud-based and mobile apps employees is creating more islands of identity that are harder for IT to track and manage.

Read More
Spirent brings vulnerability scanning and load testing on a Cloud-based platform
  • Published in

ArmorHub and Blitz.io make Website and Application development fun, easy and inexpensive for anyone with a web presence.

Read More
C2C announces availability of Compliance365
  • Published in

New offering gives Office 365 users better control over secured archives.

Read More
Orange Business Services and Sia Partners analyse new ways of working in the digital era

Orange Business Services and the consultancy Sia Partners have released a position paper which...

Read More
iboss Network Security tracks data flow

Advanced behavioural data analysis detects threats through anomalies in data movement.

Read More
Beyond Compliance: using PCI DSS to improve overall security

By Andrew Avanessian, VP of Professional Services, Avecto.

Read More
Data breaches surge in 2014

SafeNet, Inc. has released the highlights from its SafeNet Breach Level Index (BLI) for the first...

Read More
Survey shows that European companies don’t have privilege management under control

Excessive admin rights & privilege are putting companies at risk and increasing the...

Read More
BT and Exostar to help life sciences organisations collaborate

Scientists engaged in collaborative initiatives can now securely access Transformative Cloud-based...

Read More
Wind River adds security boost

New Security Profile for Wind River Linux addresses growing security vulnerabilities as more...

Read More
The ‘threat’ of third party contractors

Vormetric has announced further analysis of its ‘Insider Threat' report, conducted in...

Read More
SureCloud bridges intelligence gap between eGRC and home-grown compliance systems

SaaS platform provides game-changing way for firms to swiftly comply with changes in the regulatory...

Read More
Chemring launches Bio-inspired Cyber Security System

Chemring launches Perception™, the industry first in class Bio-inspired network security...

Read More
LogRhythm kommentiert: Bank of England: Hacker soll Schwachstellen aufspüren

Die Gefahr ist real: Internetterroristen trainieren großangelegte Angriffe auf die...

Read More

Videos

We caught up with Matthias Haymoz from SDEA at Data Centre World Frankfurt 2025 to hear about the company’s presence at the event and their role in the data centre landscape. Watch the full interview to...
Chase Doelling, Principal Strategist & Director at JumpCloud, discusses the company’s recent 2025 MSP Performance Report which looks at the challenges and opportunities for MSPs - outlining a strategic...
Steve Wilson, Chief AI and Product Officer at Exabeam, discusses the company’s recent report, From Hype to Help: How AI Is (Really) Transforming Cybersecurity in 2025, explaining that there’s no shortage...
Eric Herzog, Chief Marketing Officer at Infinidat, shares his future predictions about enterprise storage that CTOs should take into consideration and also advises as to what enterprises should be thinking...

Expert Opinions

By Peter Bradley, Product Strategy Lead, AvePoint.
By Daniel Sukowski, Global Business Development Industry & IIOT, Paessler GmbH.
By Laurent Doguin, Director, Developer Relations & Strategy, Couchbase.