
Big Data | Case Studies | Cloud Computing | Cyber Security | Information | Reports | Security | Technology | January 27, 2016
Arbor Networks 11th Finds Relentless Threat Environment Driving Demand for Managed Security Services and Incident Response Support
Arbor Networks Inc., the security division of NETSCOUT, has released its 11th Annual Worldwide Infrastructure Security…

Case Studies | Cloud Computing | Communication | Cyber Security | Data Centres | Reports | Security | Technology | January 25, 2016
1 in 10 broadly shared files in cloud apps expose sensitive and regulated data, reveals new Elastica cloud threat labs report from Blue Coat
Enterprise shadow data threat on rise as cloud app usage surges in the enterprise, opening…

Case Studies | Cloud Computing | Communication | Cyber Security | Information | Security | Technology | January 22, 2016
ISACA’s Cybersecurity Nexus Launches Tools to Help Cyber Pros Identify Controls and Navigate Their Careers
ISACA has launched two free digital tools through its Cybersecurity Nexus (CSX): Cybersecurity Career Road…

Case Studies | Communication | Cyber Security | Information | Reports | Security | Technology | January 22, 2016
Testing demonstrates that Ixia Network Packet Broker delivers 100 percent packet processing for 100 percent network visibility
Ixia has announced the processing performance results of an Ixia-sponsored test conducted by the Tolly Group…