Cloud Computing

Taking the Necessary Leap
Cyber security concerns continue to evolve rapidly, with new threats emerging every day. Cyber actors…

A Recipe to Reduce Mobile App Security Risk
As businesses roll-out their BYOD strategies, most CIOs and CEOs have no idea that many…

Unisys to Deliver Enterprise Security Innovation on the AWS Cloud
Award-winning Unisys Stealth technology delivers micro-segmentation on the Amazon Web Services Cloud for improved security,…

Vormetric hardens Data Security Manager with Thales
Cloud and big data environments demand high assurance data centric security Thales and Vormetric have…

BT Joins New Global Alliance Bringing Real Time Digital Insights From The Store And Across The Supply Chain
The Acuitas Digital Alliance is has launched by global technology leaders BT, Intel, NexGen Packaging,…

Forcepoint brings fresh approach to safeguarding users, data and networks from insider and outsider threats
@ForcePointsec announced as the new security brand with integration of Raytheon cyber products, Websense and acquisition…

BT secures major cloud services contracts with the EU
New contracts create one of the largest government clouds in Europe and executes on BT’s…

The role of containerisation in 2016
DevOps is the IT approach that combines development and operations in one unified front. Containerisation,…

New Check Point Report Reveals How Hackers Can Outsmart Smart TVs
Research on vulnerability with EZCast dongle highlights unique security challenges for consumers and businesses in…

Seagate Launches World’s Thinnest 2TB Mobile Hard Drive with Backup Plus Ultra Slim
New Compact External Drive Provides High-Capacity Storage for Users to Manage their Digital Lives Seagate…

SimpliVity joins the Microsoft Enterprise Cloud Alliance
SimpliVity has announced the company has been accepted into the Microsoft Enterprise Cloud Alliance program, and…

Allied Telesis Unveils Industry Trends and Predictions for 2016
Networking Innovator Announces 2016 Predictions: SDN, Wireless and Security and Internet of Things of Significant…

WatchGuard Predicts New Hunting Grounds for Hackers in 2016
From spear phishing to IoT and malvertising, security threats to plan for in the coming…

Legacy data protection technologies: how to avoid being vulnerable
Data centres are meant to make businesses more efficient and their users more productive. It…