Logo
Akamai Media Cloud Workflow erfüllt die MPAA-Sicherheitsanforderungen
  • Published in

Durch den integrierten DRM-Schutz in Studioqualität, wie ihn die Urheberrechtsvorgaben der Motion Picture Association of America (MPAA) vorsehen, baut Akamai die Qualität und Skalierbarkeit bei der Auslieferung von Online-Medieninhalten weiter aus. Darüber hinaus hat Akamai ein...

Read More
94 percent of IT security professionals using third party apps on their mobiles
  • Published in

New poll shows rise in cloud-based and mobile apps employees is creating more islands of identity that are harder for IT to track and manage.

Read More
Spirent brings vulnerability scanning and load testing on a Cloud-based platform
  • Published in

ArmorHub and Blitz.io make Website and Application development fun, easy and inexpensive for anyone with a web presence.

Read More
C2C announces availability of Compliance365

New offering gives Office 365 users better control over secured archives.

Read More
Orange Business Services and Sia Partners analyse new ways of working in the digital era

Orange Business Services and the consultancy Sia Partners have released a position paper which...

Read More
iboss Network Security tracks data flow

Advanced behavioural data analysis detects threats through anomalies in data movement.

Read More
Beyond Compliance: using PCI DSS to improve overall security

By Andrew Avanessian, VP of Professional Services, Avecto.

Read More
Data breaches surge in 2014

SafeNet, Inc. has released the highlights from its SafeNet Breach Level Index (BLI) for the first...

Read More
Survey shows that European companies don’t have privilege management under control

Excessive admin rights & privilege are putting companies at risk and increasing the...

Read More
BT and Exostar to help life sciences organisations collaborate

Scientists engaged in collaborative initiatives can now securely access Transformative Cloud-based...

Read More
Wind River adds security boost

New Security Profile for Wind River Linux addresses growing security vulnerabilities as more...

Read More
The ‘threat’ of third party contractors

Vormetric has announced further analysis of its ‘Insider Threat' report, conducted in...

Read More
SureCloud bridges intelligence gap between eGRC and home-grown compliance systems

SaaS platform provides game-changing way for firms to swiftly comply with changes in the regulatory...

Read More
Chemring launches Bio-inspired Cyber Security System

Chemring launches Perception™, the industry first in class Bio-inspired network security...

Read More

Videos

DCW Asia 2025 - Part 2 of 3
Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
In this conversation, ESET UK Country Manager, Matt Knell, discusses why MSPs must move beyond basic endpoint protection and adopt a layered, proactive security approach. He shares practical insights on MDR...
Lenaik Andrieux, General Manager – Power Systems EMEA, India & Australia, Rehlko, explains how the acquisition of The Wilmott Group, a UK-based supplier of critical backup-power solutions, makes Rehlko one...

Expert Opinions

By Vijay Narayan, EVP and Americas MLEU Business Unit Head at Cognizant.
By Frédéric Godemel, EVP Energy Management, Schneider Electric.
By Simon Seymour-Perry, CEO of Logica Security.