Case Studies Case Studies | Cloud Computing | Cyber Security | Information | Security | Technology | February 24, 2016 Five BYOD disasters organisations can avoid with good planning The ‘bring-your-own-device’ (BYOD) approach to business technology has many advantages. If done correctly, it can boost productivity while lowering operational… Read More Case Studies Case Studies | Cyber Security | Information | Reports | Security | Technology | February 22, 2016 Pirated iOS App Store’s Client Successfully Evaded Apple iOS Code Review Apple’s official iOS App Store is well known for its strict code review of any app submitted by a developer.… Read More Big Data Big Data | Case Studies | Cyber Security | Information | Security | Technology | February 22, 2016 New Android Trojan “Xbot” Phishes Credit Cards and Bank Accounts, Encrypts Devices for Ransom We recently discovered 22 Android apps that belong to a new Trojan family we’re calling “Xbot”. This Trojan, which is… Read More Case Studies Case Studies | Cyber Security | Information | Reports | Security | Technology | February 22, 2016 Hewlett Packard Enterprise Identifies Top Risks for Businesses Today: Application Vulnerabilities, Patching and Malware Monetisation Annual Cyber Risk Report reveals attack sophistication on the rise while organisations struggle to keep pace with dissolving perimeter and… Read More Automation Automation | Cyber Security | Information | Security | Technology | February 19, 2016 Akamai Revolutionises Bot Management Industry-first Web Security Technology – Akamai Bot Manager – Designed to Allow True Management of Bots vs. Detection and Blocking… Read More Case Studies Case Studies | Cyber Security | Information | Reports | Security | Technology | February 19, 2016 IBM Study Finds C-Suite and CISOs Not Aligned on How to Combat Cybercriminals Education and Engagement Needed to Empower C-Suite for New Security Landscape IBM Security and IBM’s Institute for Business Value (IBV)… Read More Big Data Big Data | Data Centres | Information | Technology | February 19, 2016 Seagate Now Shipping World’s Slimmest and Fastest 2TB Mobile Hard Drive New Seagate Mobile HDD Empowers OEMs to Pack Ultra-High Capacity into Slim 7mm Form Factor Seagate Technology has announced it… Read More Case Studies Case Studies | Cloud Computing | Cyber Security | Information | Security | Technology | February 17, 2016 Tips to secure the mobile workforce mobile workforce is on the rise but many businesses use inadequate solutions to protect sensitive information being transmitted between remote… Read More Case Studies Case Studies | Cyber Security | Information | Reports | Security | Technology | February 17, 2016 Dridex: Financial Trojan aggressively spread in millions of spam emails each day A new whitepaper released by Symantec overnight observes the Dridex Trojan as the most dangerous current financial threat to consumers… Read More Automation Automation | Information | Technology | February 17, 2016 COUNT® T – Single Photon Counter for Time-correlated Applications In time-correlated single photon counting (TCSPC), single photons are not only counted, but the time of detection is also determined… Read More Previous 1 … 160 161 162 163 164 … 191 Next × Sign In Log In Lost password? Log In Don't have an account? Register Now! × Recover Password Recover Password Recover × Register Log In A password will be e-mailed to you. Register
Case Studies Case Studies | Cyber Security | Information | Reports | Security | Technology | February 22, 2016 Pirated iOS App Store’s Client Successfully Evaded Apple iOS Code Review Apple’s official iOS App Store is well known for its strict code review of any app submitted by a developer.… Read More Big Data Big Data | Case Studies | Cyber Security | Information | Security | Technology | February 22, 2016 New Android Trojan “Xbot” Phishes Credit Cards and Bank Accounts, Encrypts Devices for Ransom We recently discovered 22 Android apps that belong to a new Trojan family we’re calling “Xbot”. This Trojan, which is… Read More Case Studies Case Studies | Cyber Security | Information | Reports | Security | Technology | February 22, 2016 Hewlett Packard Enterprise Identifies Top Risks for Businesses Today: Application Vulnerabilities, Patching and Malware Monetisation Annual Cyber Risk Report reveals attack sophistication on the rise while organisations struggle to keep pace with dissolving perimeter and… Read More Automation Automation | Cyber Security | Information | Security | Technology | February 19, 2016 Akamai Revolutionises Bot Management Industry-first Web Security Technology – Akamai Bot Manager – Designed to Allow True Management of Bots vs. Detection and Blocking… Read More Case Studies Case Studies | Cyber Security | Information | Reports | Security | Technology | February 19, 2016 IBM Study Finds C-Suite and CISOs Not Aligned on How to Combat Cybercriminals Education and Engagement Needed to Empower C-Suite for New Security Landscape IBM Security and IBM’s Institute for Business Value (IBV)… Read More Big Data Big Data | Data Centres | Information | Technology | February 19, 2016 Seagate Now Shipping World’s Slimmest and Fastest 2TB Mobile Hard Drive New Seagate Mobile HDD Empowers OEMs to Pack Ultra-High Capacity into Slim 7mm Form Factor Seagate Technology has announced it… Read More Case Studies Case Studies | Cloud Computing | Cyber Security | Information | Security | Technology | February 17, 2016 Tips to secure the mobile workforce mobile workforce is on the rise but many businesses use inadequate solutions to protect sensitive information being transmitted between remote… Read More Case Studies Case Studies | Cyber Security | Information | Reports | Security | Technology | February 17, 2016 Dridex: Financial Trojan aggressively spread in millions of spam emails each day A new whitepaper released by Symantec overnight observes the Dridex Trojan as the most dangerous current financial threat to consumers… Read More Automation Automation | Information | Technology | February 17, 2016 COUNT® T – Single Photon Counter for Time-correlated Applications In time-correlated single photon counting (TCSPC), single photons are not only counted, but the time of detection is also determined… Read More Previous 1 … 160 161 162 163 164 … 191 Next × Sign In Log In Lost password? Log In Don't have an account? Register Now! × Recover Password Recover Password Recover × Register Log In A password will be e-mailed to you. Register
Big Data Big Data | Case Studies | Cyber Security | Information | Security | Technology | February 22, 2016 New Android Trojan “Xbot” Phishes Credit Cards and Bank Accounts, Encrypts Devices for Ransom We recently discovered 22 Android apps that belong to a new Trojan family we’re calling “Xbot”. This Trojan, which is… Read More Case Studies Case Studies | Cyber Security | Information | Reports | Security | Technology | February 22, 2016 Hewlett Packard Enterprise Identifies Top Risks for Businesses Today: Application Vulnerabilities, Patching and Malware Monetisation Annual Cyber Risk Report reveals attack sophistication on the rise while organisations struggle to keep pace with dissolving perimeter and… Read More Automation Automation | Cyber Security | Information | Security | Technology | February 19, 2016 Akamai Revolutionises Bot Management Industry-first Web Security Technology – Akamai Bot Manager – Designed to Allow True Management of Bots vs. Detection and Blocking… Read More Case Studies Case Studies | Cyber Security | Information | Reports | Security | Technology | February 19, 2016 IBM Study Finds C-Suite and CISOs Not Aligned on How to Combat Cybercriminals Education and Engagement Needed to Empower C-Suite for New Security Landscape IBM Security and IBM’s Institute for Business Value (IBV)… Read More Big Data Big Data | Data Centres | Information | Technology | February 19, 2016 Seagate Now Shipping World’s Slimmest and Fastest 2TB Mobile Hard Drive New Seagate Mobile HDD Empowers OEMs to Pack Ultra-High Capacity into Slim 7mm Form Factor Seagate Technology has announced it… Read More Case Studies Case Studies | Cloud Computing | Cyber Security | Information | Security | Technology | February 17, 2016 Tips to secure the mobile workforce mobile workforce is on the rise but many businesses use inadequate solutions to protect sensitive information being transmitted between remote… Read More Case Studies Case Studies | Cyber Security | Information | Reports | Security | Technology | February 17, 2016 Dridex: Financial Trojan aggressively spread in millions of spam emails each day A new whitepaper released by Symantec overnight observes the Dridex Trojan as the most dangerous current financial threat to consumers… Read More Automation Automation | Information | Technology | February 17, 2016 COUNT® T – Single Photon Counter for Time-correlated Applications In time-correlated single photon counting (TCSPC), single photons are not only counted, but the time of detection is also determined… Read More Previous 1 … 160 161 162 163 164 … 191 Next × Sign In Log In Lost password? Log In Don't have an account? Register Now! × Recover Password Recover Password Recover × Register Log In A password will be e-mailed to you. Register
Case Studies Case Studies | Cyber Security | Information | Reports | Security | Technology | February 22, 2016 Hewlett Packard Enterprise Identifies Top Risks for Businesses Today: Application Vulnerabilities, Patching and Malware Monetisation Annual Cyber Risk Report reveals attack sophistication on the rise while organisations struggle to keep pace with dissolving perimeter and… Read More Automation Automation | Cyber Security | Information | Security | Technology | February 19, 2016 Akamai Revolutionises Bot Management Industry-first Web Security Technology – Akamai Bot Manager – Designed to Allow True Management of Bots vs. Detection and Blocking… Read More Case Studies Case Studies | Cyber Security | Information | Reports | Security | Technology | February 19, 2016 IBM Study Finds C-Suite and CISOs Not Aligned on How to Combat Cybercriminals Education and Engagement Needed to Empower C-Suite for New Security Landscape IBM Security and IBM’s Institute for Business Value (IBV)… Read More Big Data Big Data | Data Centres | Information | Technology | February 19, 2016 Seagate Now Shipping World’s Slimmest and Fastest 2TB Mobile Hard Drive New Seagate Mobile HDD Empowers OEMs to Pack Ultra-High Capacity into Slim 7mm Form Factor Seagate Technology has announced it… Read More Case Studies Case Studies | Cloud Computing | Cyber Security | Information | Security | Technology | February 17, 2016 Tips to secure the mobile workforce mobile workforce is on the rise but many businesses use inadequate solutions to protect sensitive information being transmitted between remote… Read More Case Studies Case Studies | Cyber Security | Information | Reports | Security | Technology | February 17, 2016 Dridex: Financial Trojan aggressively spread in millions of spam emails each day A new whitepaper released by Symantec overnight observes the Dridex Trojan as the most dangerous current financial threat to consumers… Read More Automation Automation | Information | Technology | February 17, 2016 COUNT® T – Single Photon Counter for Time-correlated Applications In time-correlated single photon counting (TCSPC), single photons are not only counted, but the time of detection is also determined… Read More Previous 1 … 160 161 162 163 164 … 191 Next × Sign In Log In Lost password? Log In Don't have an account? Register Now! × Recover Password Recover Password Recover × Register Log In A password will be e-mailed to you. Register
Automation Automation | Cyber Security | Information | Security | Technology | February 19, 2016 Akamai Revolutionises Bot Management Industry-first Web Security Technology – Akamai Bot Manager – Designed to Allow True Management of Bots vs. Detection and Blocking… Read More Case Studies Case Studies | Cyber Security | Information | Reports | Security | Technology | February 19, 2016 IBM Study Finds C-Suite and CISOs Not Aligned on How to Combat Cybercriminals Education and Engagement Needed to Empower C-Suite for New Security Landscape IBM Security and IBM’s Institute for Business Value (IBV)… Read More Big Data Big Data | Data Centres | Information | Technology | February 19, 2016 Seagate Now Shipping World’s Slimmest and Fastest 2TB Mobile Hard Drive New Seagate Mobile HDD Empowers OEMs to Pack Ultra-High Capacity into Slim 7mm Form Factor Seagate Technology has announced it… Read More Case Studies Case Studies | Cloud Computing | Cyber Security | Information | Security | Technology | February 17, 2016 Tips to secure the mobile workforce mobile workforce is on the rise but many businesses use inadequate solutions to protect sensitive information being transmitted between remote… Read More Case Studies Case Studies | Cyber Security | Information | Reports | Security | Technology | February 17, 2016 Dridex: Financial Trojan aggressively spread in millions of spam emails each day A new whitepaper released by Symantec overnight observes the Dridex Trojan as the most dangerous current financial threat to consumers… Read More Automation Automation | Information | Technology | February 17, 2016 COUNT® T – Single Photon Counter for Time-correlated Applications In time-correlated single photon counting (TCSPC), single photons are not only counted, but the time of detection is also determined… Read More Previous 1 … 160 161 162 163 164 … 191 Next × Sign In Log In Lost password? Log In Don't have an account? Register Now! × Recover Password Recover Password Recover × Register Log In A password will be e-mailed to you. Register
Case Studies Case Studies | Cyber Security | Information | Reports | Security | Technology | February 19, 2016 IBM Study Finds C-Suite and CISOs Not Aligned on How to Combat Cybercriminals Education and Engagement Needed to Empower C-Suite for New Security Landscape IBM Security and IBM’s Institute for Business Value (IBV)… Read More Big Data Big Data | Data Centres | Information | Technology | February 19, 2016 Seagate Now Shipping World’s Slimmest and Fastest 2TB Mobile Hard Drive New Seagate Mobile HDD Empowers OEMs to Pack Ultra-High Capacity into Slim 7mm Form Factor Seagate Technology has announced it… Read More Case Studies Case Studies | Cloud Computing | Cyber Security | Information | Security | Technology | February 17, 2016 Tips to secure the mobile workforce mobile workforce is on the rise but many businesses use inadequate solutions to protect sensitive information being transmitted between remote… Read More Case Studies Case Studies | Cyber Security | Information | Reports | Security | Technology | February 17, 2016 Dridex: Financial Trojan aggressively spread in millions of spam emails each day A new whitepaper released by Symantec overnight observes the Dridex Trojan as the most dangerous current financial threat to consumers… Read More Automation Automation | Information | Technology | February 17, 2016 COUNT® T – Single Photon Counter for Time-correlated Applications In time-correlated single photon counting (TCSPC), single photons are not only counted, but the time of detection is also determined… Read More Previous 1 … 160 161 162 163 164 … 191 Next × Sign In Log In Lost password? Log In Don't have an account? Register Now! × Recover Password Recover Password Recover × Register Log In A password will be e-mailed to you. Register
Big Data Big Data | Data Centres | Information | Technology | February 19, 2016 Seagate Now Shipping World’s Slimmest and Fastest 2TB Mobile Hard Drive New Seagate Mobile HDD Empowers OEMs to Pack Ultra-High Capacity into Slim 7mm Form Factor Seagate Technology has announced it… Read More Case Studies Case Studies | Cloud Computing | Cyber Security | Information | Security | Technology | February 17, 2016 Tips to secure the mobile workforce mobile workforce is on the rise but many businesses use inadequate solutions to protect sensitive information being transmitted between remote… Read More Case Studies Case Studies | Cyber Security | Information | Reports | Security | Technology | February 17, 2016 Dridex: Financial Trojan aggressively spread in millions of spam emails each day A new whitepaper released by Symantec overnight observes the Dridex Trojan as the most dangerous current financial threat to consumers… Read More Automation Automation | Information | Technology | February 17, 2016 COUNT® T – Single Photon Counter for Time-correlated Applications In time-correlated single photon counting (TCSPC), single photons are not only counted, but the time of detection is also determined… Read More Previous 1 … 160 161 162 163 164 … 191 Next
Case Studies Case Studies | Cloud Computing | Cyber Security | Information | Security | Technology | February 17, 2016 Tips to secure the mobile workforce mobile workforce is on the rise but many businesses use inadequate solutions to protect sensitive information being transmitted between remote… Read More Case Studies Case Studies | Cyber Security | Information | Reports | Security | Technology | February 17, 2016 Dridex: Financial Trojan aggressively spread in millions of spam emails each day A new whitepaper released by Symantec overnight observes the Dridex Trojan as the most dangerous current financial threat to consumers… Read More Automation Automation | Information | Technology | February 17, 2016 COUNT® T – Single Photon Counter for Time-correlated Applications In time-correlated single photon counting (TCSPC), single photons are not only counted, but the time of detection is also determined… Read More Previous 1 … 160 161 162 163 164 … 191 Next
Case Studies Case Studies | Cyber Security | Information | Reports | Security | Technology | February 17, 2016 Dridex: Financial Trojan aggressively spread in millions of spam emails each day A new whitepaper released by Symantec overnight observes the Dridex Trojan as the most dangerous current financial threat to consumers… Read More Automation Automation | Information | Technology | February 17, 2016 COUNT® T – Single Photon Counter for Time-correlated Applications In time-correlated single photon counting (TCSPC), single photons are not only counted, but the time of detection is also determined… Read More Previous 1 … 160 161 162 163 164 … 191 Next
Automation Automation | Information | Technology | February 17, 2016 COUNT® T – Single Photon Counter for Time-correlated Applications In time-correlated single photon counting (TCSPC), single photons are not only counted, but the time of detection is also determined… Read More Previous 1 … 160 161 162 163 164 … 191 Next