New threats subverting digital signature validation
  • Published in

McAfee Labs has released the McAfee Labs Threats Report: Third Quarter 2013, which found new efforts to circumvent digital signature app validation on both PCs and Android-based devices. The McAfee Labs team identified a new family of mobile malware that allows an attacker to bypass the digital...

Read More
Visibility into Cloud applications, user risk, and attacker methodologies
  • Published in

Rapid7 has announced the general availability of its cloud application and user risk management solution, Rapid7 UserInsight, as well as several enhancements to its information-driven security analytics portfolio. With these innovations, Rapid7 is the first and only security analytics provider to...

Read More
CloudSigma offers infrastructure-level firewalls
  • Published in

CloudSigma has announced the general availability of advanced network policy management across all its cloud locations. With this new feature, customers can create, manage and apply enterprise-grade networking policies in relation to their cloud infrastructure in a fully integrated way. By removing...

Read More
Temporary workers still require adequate data protection training, warns ICO
  • Published in

The Information Commissioner’s Office (ICO) is warning employers about the importance of making sure temporary staff – who regularly handle personal information - receive adequate data protection training.

Read More
China rates itself as world’s #1

EMC® Corporation has announced results of an independent survey revealing fresh insights about...

Read More
Study shows technology use and risks outpacing IT audit

Survey results find companies challenged by variety of technology issues, including security,...

Read More
United Kingdom ranks high for ‘Compulsive Clickers’

90% of workers in Britain cannot resist clicking on a web link, according to a survey conducted on...

Read More
Fighting evolving targeted attacks

Symantec bolsters targeted attack protection portfolio with new Disarm technology for Symantec...

Read More
Capgemini is awarded three framework agreements

Capgemini Deutschland GmbH has been awarded three framework agreements with the Data Processing and...

Read More
Splunk turns to Ping Identity

Splunk has selected Ping Identity to provide its customers with simple and secure access to the...

Read More
Palo Alto Networks and VMware ‘transform’ Cloud deployments

Palo Alto Networks® and VMware, Inc. have announced a partnership backed by a new...

Read More
Damballa reduces ‘time to containment’

Damballa has announced general availability of Damballa Failsafe 5.2 for enterprises, which...

Read More
LSI 12Gb/s-SAS-MegaRAID-Controllerkarten und Expander beschleunigen führende Rechenzentren weltweit

LSI erweitert ihr branchenweit erstes 12Gb/s-SAS Portfolio um End-to-End-Speicherlösungen...

Read More

Videos

Data Centre World Asia 2025
Mark Jow, Gigamon Technical Evangelist, discusses the company’s recent report, “CISO Insights: Recalibrating Risk in the Age of AI”, which reveals how global CISOs are reshaping 2026 cybersecurity...
Bobby Eagle, Senior Director, Global External Communications at TD SYNNEX, discusses the findings of the company’s Fourth Annual Direction of Technology Report, which highlights how blending AI-driven...
Abel Gnanakumar, Vice President, Commercial HVAC - Asia, Middle East & Africa at Copeland, discusses the surge in data centre development across Asia and its unique climate challenges, the twin drivers of AI...

Expert Opinions

By James Montgomery, Field Marketing Engineer, Q-PAC
By Sachin Agrawal, Managing Director for Zoho UK.
By Gordon Johnson, Senior CFD Manager, Subzero Engineering.
By James Smith, sales and marketing director - Reliance High-Tech.