New threats subverting digital signature validation
  • Published in

McAfee Labs has released the McAfee Labs Threats Report: Third Quarter 2013, which found new efforts to circumvent digital signature app validation on both PCs and Android-based devices. The McAfee Labs team identified a new family of mobile malware that allows an attacker to bypass the digital...

Read More
Visibility into Cloud applications, user risk, and attacker methodologies
  • Published in

Rapid7 has announced the general availability of its cloud application and user risk management solution, Rapid7 UserInsight, as well as several enhancements to its information-driven security analytics portfolio. With these innovations, Rapid7 is the first and only security analytics provider to...

Read More
CloudSigma offers infrastructure-level firewalls
  • Published in

CloudSigma has announced the general availability of advanced network policy management across all its cloud locations. With this new feature, customers can create, manage and apply enterprise-grade networking policies in relation to their cloud infrastructure in a fully integrated way. By removing...

Read More
Temporary workers still require adequate data protection training, warns ICO
  • Published in

The Information Commissioner’s Office (ICO) is warning employers about the importance of making sure temporary staff – who regularly handle personal information - receive adequate data protection training.

Read More
China rates itself as world’s #1

EMC® Corporation has announced results of an independent survey revealing fresh insights about...

Read More
Study shows technology use and risks outpacing IT audit

Survey results find companies challenged by variety of technology issues, including security,...

Read More
United Kingdom ranks high for ‘Compulsive Clickers’

90% of workers in Britain cannot resist clicking on a web link, according to a survey conducted on...

Read More
Fighting evolving targeted attacks

Symantec bolsters targeted attack protection portfolio with new Disarm technology for Symantec...

Read More
Capgemini is awarded three framework agreements

Capgemini Deutschland GmbH has been awarded three framework agreements with the Data Processing and...

Read More
Splunk turns to Ping Identity

Splunk has selected Ping Identity to provide its customers with simple and secure access to the...

Read More
Palo Alto Networks and VMware ‘transform’ Cloud deployments

Palo Alto Networks® and VMware, Inc. have announced a partnership backed by a new...

Read More
Damballa reduces ‘time to containment’

Damballa has announced general availability of Damballa Failsafe 5.2 for enterprises, which...

Read More
LSI 12Gb/s-SAS-MegaRAID-Controllerkarten und Expander beschleunigen führende Rechenzentren weltweit

LSI erweitert ihr branchenweit erstes 12Gb/s-SAS Portfolio um End-to-End-Speicherlösungen...

Read More

Videos

Simon Taylor, Chairman at Bioscope and sister company N2S, shares a progress report on the importance of biorefining and bioleaching when it comes to precious metals and the increasing importance of conserving...
At Data Centre World Frankfurt 2025, we caught up with Claudia Ludenbach from TRILUX to hear about the company’s presence at the event and their role in the data centre space. Watch the full interview to...
At Data Centre World Frankfurt 2025, we spoke with Oliver Callies from Semsafe to hear about the company’s involvement in the event and their perspective on the data centre industry. Watch the full...
Sal King, Channel Sales Manager for the UK and Ireland at Scalefusion, discusses the company’s expansion into a new region as part of the company’s commitment to meeting the growing demand for enterprise...

Expert Opinions

By Avi Perez, CTO of Pyramid Analytics.
By Barley Laing, the UK Managing Director at Melissa.
By Gary Sidhu, SVP Product Engineering at GTT.
By Darren Watkins, Chief Revenue Office at VIRTUS Data Centres.