
Case Studies | Cloud Computing | Communication | Cyber Security | Data Centres | Reports | Security | Technology | January 25, 2016
1 in 10 broadly shared files in cloud apps expose sensitive and regulated data, reveals new Elastica cloud threat labs report from Blue Coat
Enterprise shadow data threat on rise as cloud app usage surges in the enterprise, opening…

Case Studies | Cloud Computing | Communication | Cyber Security | Information | Security | Technology | January 22, 2016
ISACA’s Cybersecurity Nexus Launches Tools to Help Cyber Pros Identify Controls and Navigate Their Careers
ISACA has launched two free digital tools through its Cybersecurity Nexus (CSX): Cybersecurity Career Road…

Case Studies | Communication | Cyber Security | Information | Reports | Security | Technology | January 22, 2016
Testing demonstrates that Ixia Network Packet Broker delivers 100 percent packet processing for 100 percent network visibility
Ixia has announced the processing performance results of an Ixia-sponsored test conducted by the Tolly Group…

Case Studies | Cloud Computing | Communication | Cyber Security | Information | Reports | Security | Technology | January 22, 2016
Taking the Necessary Leap
Cyber security concerns continue to evolve rapidly, with new threats emerging every day. Cyber actors…