Case Studies Case Studies | Communication | Cyber Security | Movers & Shakers | Security | Technology | September 8, 2016 Historic Dell and EMC Merger Complete; Forms World’s Largest Privately-Controlled Tech Company Dell Technologies to Provide the Essential Infrastructure to Enable Digital Business and Transform IT Dell Technologies becomes the world’s largest… Read More Case Studies Case Studies | Cyber Security | Data Centres | Information | Security | Technology | September 7, 2016 The New AAA: APIs, Authentication, and Availability By Lori Macvittie, Principal Technical Evangelist, United States, F5 Networks You might have figured out that yes, I’m one of… Read More Case Studies Case Studies | Cloud Computing | Cyber Security | Data Centres | Movers & Shakers | Security | Technology | September 7, 2016 Gemalto significantly expands big data security offerings Enhanced encryption capabilities and broad range of technology integrations provide greater flexibility for enterprises to protect big data deployments Gemalto has… Read More Case Studies Case Studies | Communication | Cyber Security | Featured Stories | Information | Security | Technology | September 5, 2016 ISACA’s CSX Hosts Free Virtual Conference: “Cybersecurity Evolves” The digital world is on a constant continuum of evolution and expansion. To keep pace, enterprises are beginning to put… Read More Case Studies Case Studies | Cyber Security | Information | Reports | Security | August 31, 2016 Courtesy of the BESA Center: BESA Center Perspectives Paper No. 360, August 30, 2016 By Maj. Gen. (res.) Yaakov Amidror EXECUTIVE SUMMARY: Israel’s young cyber industry is proving to be a remarkable success story.… Read More Case Studies Case Studies | Cyber Security | Information | Security | Technology | August 31, 2016 Closing the SecOps gap- how to harden IT security against hackers and vulnerabilities By David Carless, Automation and Cloud Specialist, BMC Software Australia In 2015, headlines were rife with reports of cyberattacks stealing… Read More Case Studies Case Studies | Cyber Security | Information | Reports | Security | Technology | August 29, 2016 First Twitter-controlled Android botnet discovered by ESET ESET researchers discovered an Android backdoor Trojan controlled by tweets. Detected by ESET as Android/Twitoor, it’s the first malicious app… Read More Case Studies Case Studies | Cyber Security | Information | Security | Technology | August 29, 2016 ISACA Guide Assists With GEIT Implementation GEIT allows organisations to make more effective use of resources Successful implementation of Governance of Enterprise IT (GEIT) can transform… Read More Case Studies Case Studies | Cyber Security | Reports | Security | Technology | August 26, 2016 SecureWorks Research Indicates Top Ransomware Families Making Their Way Through APAC Region At least 0.25% to 3.0% of victims pay ransom to attackers holding data hostage SecureWorks Counter Threat Unit (CTU) researchers… Read More Case Studies Case Studies | Communication | Cyber Security | Data Centres | Information | Movers & Shakers | Reports | Security | Technology | August 24, 2016 Ownership of data projects is shifting back to the CIO and IT team CFOs and CIOs now represent the biggest source of data analytics project requests, followed by the marketing and sales teams,… Read More Previous 1 … 32 33 34 35 36 … 54 Next × Sign In Log In Lost password? Log In Don't have an account? Register Now! × Recover Password Recover Password Recover × Register Log In A password will be e-mailed to you. Register
Case Studies Case Studies | Cyber Security | Data Centres | Information | Security | Technology | September 7, 2016 The New AAA: APIs, Authentication, and Availability By Lori Macvittie, Principal Technical Evangelist, United States, F5 Networks You might have figured out that yes, I’m one of… Read More Case Studies Case Studies | Cloud Computing | Cyber Security | Data Centres | Movers & Shakers | Security | Technology | September 7, 2016 Gemalto significantly expands big data security offerings Enhanced encryption capabilities and broad range of technology integrations provide greater flexibility for enterprises to protect big data deployments Gemalto has… Read More Case Studies Case Studies | Communication | Cyber Security | Featured Stories | Information | Security | Technology | September 5, 2016 ISACA’s CSX Hosts Free Virtual Conference: “Cybersecurity Evolves” The digital world is on a constant continuum of evolution and expansion. To keep pace, enterprises are beginning to put… Read More Case Studies Case Studies | Cyber Security | Information | Reports | Security | August 31, 2016 Courtesy of the BESA Center: BESA Center Perspectives Paper No. 360, August 30, 2016 By Maj. Gen. (res.) Yaakov Amidror EXECUTIVE SUMMARY: Israel’s young cyber industry is proving to be a remarkable success story.… Read More Case Studies Case Studies | Cyber Security | Information | Security | Technology | August 31, 2016 Closing the SecOps gap- how to harden IT security against hackers and vulnerabilities By David Carless, Automation and Cloud Specialist, BMC Software Australia In 2015, headlines were rife with reports of cyberattacks stealing… Read More Case Studies Case Studies | Cyber Security | Information | Reports | Security | Technology | August 29, 2016 First Twitter-controlled Android botnet discovered by ESET ESET researchers discovered an Android backdoor Trojan controlled by tweets. Detected by ESET as Android/Twitoor, it’s the first malicious app… Read More Case Studies Case Studies | Cyber Security | Information | Security | Technology | August 29, 2016 ISACA Guide Assists With GEIT Implementation GEIT allows organisations to make more effective use of resources Successful implementation of Governance of Enterprise IT (GEIT) can transform… Read More Case Studies Case Studies | Cyber Security | Reports | Security | Technology | August 26, 2016 SecureWorks Research Indicates Top Ransomware Families Making Their Way Through APAC Region At least 0.25% to 3.0% of victims pay ransom to attackers holding data hostage SecureWorks Counter Threat Unit (CTU) researchers… Read More Case Studies Case Studies | Communication | Cyber Security | Data Centres | Information | Movers & Shakers | Reports | Security | Technology | August 24, 2016 Ownership of data projects is shifting back to the CIO and IT team CFOs and CIOs now represent the biggest source of data analytics project requests, followed by the marketing and sales teams,… Read More Previous 1 … 32 33 34 35 36 … 54 Next × Sign In Log In Lost password? Log In Don't have an account? Register Now! × Recover Password Recover Password Recover × Register Log In A password will be e-mailed to you. Register
Case Studies Case Studies | Cloud Computing | Cyber Security | Data Centres | Movers & Shakers | Security | Technology | September 7, 2016 Gemalto significantly expands big data security offerings Enhanced encryption capabilities and broad range of technology integrations provide greater flexibility for enterprises to protect big data deployments Gemalto has… Read More Case Studies Case Studies | Communication | Cyber Security | Featured Stories | Information | Security | Technology | September 5, 2016 ISACA’s CSX Hosts Free Virtual Conference: “Cybersecurity Evolves” The digital world is on a constant continuum of evolution and expansion. To keep pace, enterprises are beginning to put… Read More Case Studies Case Studies | Cyber Security | Information | Reports | Security | August 31, 2016 Courtesy of the BESA Center: BESA Center Perspectives Paper No. 360, August 30, 2016 By Maj. Gen. (res.) Yaakov Amidror EXECUTIVE SUMMARY: Israel’s young cyber industry is proving to be a remarkable success story.… Read More Case Studies Case Studies | Cyber Security | Information | Security | Technology | August 31, 2016 Closing the SecOps gap- how to harden IT security against hackers and vulnerabilities By David Carless, Automation and Cloud Specialist, BMC Software Australia In 2015, headlines were rife with reports of cyberattacks stealing… Read More Case Studies Case Studies | Cyber Security | Information | Reports | Security | Technology | August 29, 2016 First Twitter-controlled Android botnet discovered by ESET ESET researchers discovered an Android backdoor Trojan controlled by tweets. Detected by ESET as Android/Twitoor, it’s the first malicious app… Read More Case Studies Case Studies | Cyber Security | Information | Security | Technology | August 29, 2016 ISACA Guide Assists With GEIT Implementation GEIT allows organisations to make more effective use of resources Successful implementation of Governance of Enterprise IT (GEIT) can transform… Read More Case Studies Case Studies | Cyber Security | Reports | Security | Technology | August 26, 2016 SecureWorks Research Indicates Top Ransomware Families Making Their Way Through APAC Region At least 0.25% to 3.0% of victims pay ransom to attackers holding data hostage SecureWorks Counter Threat Unit (CTU) researchers… Read More Case Studies Case Studies | Communication | Cyber Security | Data Centres | Information | Movers & Shakers | Reports | Security | Technology | August 24, 2016 Ownership of data projects is shifting back to the CIO and IT team CFOs and CIOs now represent the biggest source of data analytics project requests, followed by the marketing and sales teams,… Read More Previous 1 … 32 33 34 35 36 … 54 Next × Sign In Log In Lost password? Log In Don't have an account? Register Now! × Recover Password Recover Password Recover × Register Log In A password will be e-mailed to you. Register
Case Studies Case Studies | Communication | Cyber Security | Featured Stories | Information | Security | Technology | September 5, 2016 ISACA’s CSX Hosts Free Virtual Conference: “Cybersecurity Evolves” The digital world is on a constant continuum of evolution and expansion. To keep pace, enterprises are beginning to put… Read More Case Studies Case Studies | Cyber Security | Information | Reports | Security | August 31, 2016 Courtesy of the BESA Center: BESA Center Perspectives Paper No. 360, August 30, 2016 By Maj. Gen. (res.) Yaakov Amidror EXECUTIVE SUMMARY: Israel’s young cyber industry is proving to be a remarkable success story.… Read More Case Studies Case Studies | Cyber Security | Information | Security | Technology | August 31, 2016 Closing the SecOps gap- how to harden IT security against hackers and vulnerabilities By David Carless, Automation and Cloud Specialist, BMC Software Australia In 2015, headlines were rife with reports of cyberattacks stealing… Read More Case Studies Case Studies | Cyber Security | Information | Reports | Security | Technology | August 29, 2016 First Twitter-controlled Android botnet discovered by ESET ESET researchers discovered an Android backdoor Trojan controlled by tweets. Detected by ESET as Android/Twitoor, it’s the first malicious app… Read More Case Studies Case Studies | Cyber Security | Information | Security | Technology | August 29, 2016 ISACA Guide Assists With GEIT Implementation GEIT allows organisations to make more effective use of resources Successful implementation of Governance of Enterprise IT (GEIT) can transform… Read More Case Studies Case Studies | Cyber Security | Reports | Security | Technology | August 26, 2016 SecureWorks Research Indicates Top Ransomware Families Making Their Way Through APAC Region At least 0.25% to 3.0% of victims pay ransom to attackers holding data hostage SecureWorks Counter Threat Unit (CTU) researchers… Read More Case Studies Case Studies | Communication | Cyber Security | Data Centres | Information | Movers & Shakers | Reports | Security | Technology | August 24, 2016 Ownership of data projects is shifting back to the CIO and IT team CFOs and CIOs now represent the biggest source of data analytics project requests, followed by the marketing and sales teams,… Read More Previous 1 … 32 33 34 35 36 … 54 Next × Sign In Log In Lost password? Log In Don't have an account? Register Now! × Recover Password Recover Password Recover × Register Log In A password will be e-mailed to you. Register
Case Studies Case Studies | Cyber Security | Information | Reports | Security | August 31, 2016 Courtesy of the BESA Center: BESA Center Perspectives Paper No. 360, August 30, 2016 By Maj. Gen. (res.) Yaakov Amidror EXECUTIVE SUMMARY: Israel’s young cyber industry is proving to be a remarkable success story.… Read More Case Studies Case Studies | Cyber Security | Information | Security | Technology | August 31, 2016 Closing the SecOps gap- how to harden IT security against hackers and vulnerabilities By David Carless, Automation and Cloud Specialist, BMC Software Australia In 2015, headlines were rife with reports of cyberattacks stealing… Read More Case Studies Case Studies | Cyber Security | Information | Reports | Security | Technology | August 29, 2016 First Twitter-controlled Android botnet discovered by ESET ESET researchers discovered an Android backdoor Trojan controlled by tweets. Detected by ESET as Android/Twitoor, it’s the first malicious app… Read More Case Studies Case Studies | Cyber Security | Information | Security | Technology | August 29, 2016 ISACA Guide Assists With GEIT Implementation GEIT allows organisations to make more effective use of resources Successful implementation of Governance of Enterprise IT (GEIT) can transform… Read More Case Studies Case Studies | Cyber Security | Reports | Security | Technology | August 26, 2016 SecureWorks Research Indicates Top Ransomware Families Making Their Way Through APAC Region At least 0.25% to 3.0% of victims pay ransom to attackers holding data hostage SecureWorks Counter Threat Unit (CTU) researchers… Read More Case Studies Case Studies | Communication | Cyber Security | Data Centres | Information | Movers & Shakers | Reports | Security | Technology | August 24, 2016 Ownership of data projects is shifting back to the CIO and IT team CFOs and CIOs now represent the biggest source of data analytics project requests, followed by the marketing and sales teams,… Read More Previous 1 … 32 33 34 35 36 … 54 Next × Sign In Log In Lost password? Log In Don't have an account? Register Now! × Recover Password Recover Password Recover × Register Log In A password will be e-mailed to you. Register
Case Studies Case Studies | Cyber Security | Information | Security | Technology | August 31, 2016 Closing the SecOps gap- how to harden IT security against hackers and vulnerabilities By David Carless, Automation and Cloud Specialist, BMC Software Australia In 2015, headlines were rife with reports of cyberattacks stealing… Read More Case Studies Case Studies | Cyber Security | Information | Reports | Security | Technology | August 29, 2016 First Twitter-controlled Android botnet discovered by ESET ESET researchers discovered an Android backdoor Trojan controlled by tweets. Detected by ESET as Android/Twitoor, it’s the first malicious app… Read More Case Studies Case Studies | Cyber Security | Information | Security | Technology | August 29, 2016 ISACA Guide Assists With GEIT Implementation GEIT allows organisations to make more effective use of resources Successful implementation of Governance of Enterprise IT (GEIT) can transform… Read More Case Studies Case Studies | Cyber Security | Reports | Security | Technology | August 26, 2016 SecureWorks Research Indicates Top Ransomware Families Making Their Way Through APAC Region At least 0.25% to 3.0% of victims pay ransom to attackers holding data hostage SecureWorks Counter Threat Unit (CTU) researchers… Read More Case Studies Case Studies | Communication | Cyber Security | Data Centres | Information | Movers & Shakers | Reports | Security | Technology | August 24, 2016 Ownership of data projects is shifting back to the CIO and IT team CFOs and CIOs now represent the biggest source of data analytics project requests, followed by the marketing and sales teams,… Read More Previous 1 … 32 33 34 35 36 … 54 Next × Sign In Log In Lost password? Log In Don't have an account? Register Now! × Recover Password Recover Password Recover × Register Log In A password will be e-mailed to you. Register
Case Studies Case Studies | Cyber Security | Information | Reports | Security | Technology | August 29, 2016 First Twitter-controlled Android botnet discovered by ESET ESET researchers discovered an Android backdoor Trojan controlled by tweets. Detected by ESET as Android/Twitoor, it’s the first malicious app… Read More Case Studies Case Studies | Cyber Security | Information | Security | Technology | August 29, 2016 ISACA Guide Assists With GEIT Implementation GEIT allows organisations to make more effective use of resources Successful implementation of Governance of Enterprise IT (GEIT) can transform… Read More Case Studies Case Studies | Cyber Security | Reports | Security | Technology | August 26, 2016 SecureWorks Research Indicates Top Ransomware Families Making Their Way Through APAC Region At least 0.25% to 3.0% of victims pay ransom to attackers holding data hostage SecureWorks Counter Threat Unit (CTU) researchers… Read More Case Studies Case Studies | Communication | Cyber Security | Data Centres | Information | Movers & Shakers | Reports | Security | Technology | August 24, 2016 Ownership of data projects is shifting back to the CIO and IT team CFOs and CIOs now represent the biggest source of data analytics project requests, followed by the marketing and sales teams,… Read More Previous 1 … 32 33 34 35 36 … 54 Next
Case Studies Case Studies | Cyber Security | Information | Security | Technology | August 29, 2016 ISACA Guide Assists With GEIT Implementation GEIT allows organisations to make more effective use of resources Successful implementation of Governance of Enterprise IT (GEIT) can transform… Read More Case Studies Case Studies | Cyber Security | Reports | Security | Technology | August 26, 2016 SecureWorks Research Indicates Top Ransomware Families Making Their Way Through APAC Region At least 0.25% to 3.0% of victims pay ransom to attackers holding data hostage SecureWorks Counter Threat Unit (CTU) researchers… Read More Case Studies Case Studies | Communication | Cyber Security | Data Centres | Information | Movers & Shakers | Reports | Security | Technology | August 24, 2016 Ownership of data projects is shifting back to the CIO and IT team CFOs and CIOs now represent the biggest source of data analytics project requests, followed by the marketing and sales teams,… Read More Previous 1 … 32 33 34 35 36 … 54 Next
Case Studies Case Studies | Cyber Security | Reports | Security | Technology | August 26, 2016 SecureWorks Research Indicates Top Ransomware Families Making Their Way Through APAC Region At least 0.25% to 3.0% of victims pay ransom to attackers holding data hostage SecureWorks Counter Threat Unit (CTU) researchers… Read More Case Studies Case Studies | Communication | Cyber Security | Data Centres | Information | Movers & Shakers | Reports | Security | Technology | August 24, 2016 Ownership of data projects is shifting back to the CIO and IT team CFOs and CIOs now represent the biggest source of data analytics project requests, followed by the marketing and sales teams,… Read More Previous 1 … 32 33 34 35 36 … 54 Next
Case Studies Case Studies | Communication | Cyber Security | Data Centres | Information | Movers & Shakers | Reports | Security | Technology | August 24, 2016 Ownership of data projects is shifting back to the CIO and IT team CFOs and CIOs now represent the biggest source of data analytics project requests, followed by the marketing and sales teams,… Read More Previous 1 … 32 33 34 35 36 … 54 Next