Pro Gmail for Work gets improved digital loss protection features Organisations can now use OCR to scan attachments for sensitive data 1 Mar
Pro EU-US Privacy Shield fleshed out in preparation for law Agreement that will allow the export of EU citizens' personal data to the US for processing is taking shape 1 Mar
Pro Fixing the Internet’s routing security is urgent, requiring collaboration A volunteer participation program for ISPs to prevent route hijacks and IP spoofing is gaining some traction 29 Feb
Pro Firms detect breaches sooner, but attackers are getting nastier Extortion attacks are on the rise, finds Mandiant 29 Feb
Pro Containers are just the beginning for enterprise IT Offering an IT infrastructure revolution, containers can have security at their core, says CoreOS boss 26 Feb
Pro Companies paying hush money to data thieves Many are giving in to extortion rather than face ruin of dumped sensitive data 26 Feb
Pro Microsoft strengthens security tools for Azure, Office 365 Promised a new approach to enterprise security arrives 26 Feb
Pro Eir Business’ IoT service leverages Asavie platform IoT Connectivity Platform underpins new service, and joins INFINITE project 25 Feb
Pro FBI wants software equivalent of ‘cancer’ for iPhone Apple CEO asserts backdoor request could be the beginning of a worrying trend 25 Feb
Pro Tech companies ‘whipsawed’ by conflicting laws on global data transfer Microsoft seeks reform of US law and inter-government treaties 25 Feb
Pro BlackBerry looks to IoT with new cybersecurity practice Company will also focus on automotive IT security 25 Feb
Pro Alluxio speeds data links between apps and storage Storage API features support for Amazon S3, Google Cloud Storage, OpenStack Swift, EMC, and NetApp 24 Feb
Pro Barry Lowry appointed new Government CIO Former Northern Ireland Shared Services director to take up role in April 24 Feb
Pro Japan’s infrastructure probed by cybergroup Security firm says the group may have links to APT 1, believed to be part of China's army 24 Feb
Pro US DoJ increases pressure on Apple for iPhone crack Apple will oppose court order, say lawyers, who want it compelled to assist FBI 22 Feb
Pro Google’s custom cloud infrastructure services leave beta Custom Machine Types allow developers to design their own compute instances 22 Feb
Blogs Of back doors, back channels and moral high ground Is there more than meets the eye to the law enforcement request for an iPhone crack? 19 Feb
Pro Red Hat, Microsoft partner to run RHEL in Azure Red Hat Enterprise Linux images are now available in Azure, with both Microsoft and Red Hat providing support, boosting Microsoft's hybrid cloud... 19 Feb
Pro Dell to bring new hyperscale rack architecture to the mid-range DSS 9000 rack architecture will allow customers to de-couple storage and computing resources 19 Feb
Pro Who needs a chief data officer? 'Data are your customers, are your business, are you,' says executive 18 Feb
Pro Apache Arrow aims to speed access to Big Data New project leverages columnar storage to speed data access for Hadoop and other languages 18 Feb
Pro Unix bug puts Linux systems at risk Google and Red Hat researchers released a patch for a critical remote code execution flaw in glibc 2.9 and later 18 Feb
Pro Ransomware takes Californian hospital offline Network offline for more than a week, $3.6m demanded as ransom 17 Feb
Pro IBM z13s mainframe gets security and hybrid focus First new mainframe in years boasts fast encryption without performance hit 17 Feb
Pro Companies more disposed to pay ransomware attacks Cyber insurance making companies more likely to pay up in ransomware attacks 16 Feb
Pro Linux Foundation plans to speed up storage, networking Fast Data Project aims for a fast, open source data plane for networking and storage 16 Feb
Pro Samsung’s new range of displays aims to improve productivity Curved monitors, wireless charging and UHD options in new displays 16 Feb
Insights Ransomware attacks common for Irish organisations Preliminary survey results show extent of crypto-malware, and organisations’ response 15 Feb
Pro Successful network defence requires a change in thinking Microsoft's Lambert urges security experts to think in terms of network graphs, not asset lists 15 Feb
Pro Sony attackers thought to be behind multiple large attacks Security researchers have found similarities in malware and attack methods and now know what digital breadcrumbs to follow 15 Feb
Pro VMware’s new management tools are hybrid heavy Managing your data centre and the public cloud 15 Feb
Blogs Cloud washing gives way to cloud laundering The mist has crept over how vendors report cloud earnings 12 Feb
Pro Cisco VPN flaw exposes security appliances to remote hacking Firewalls running Cisco Adaptive Security Appliance software can be compromised remotely with malformed UDP packets 12 Feb
Pro Terrorists will use secure alternatives to avoid encryption backdoors Study says there are 546 encryption products that lie outside US law, says study 12 Feb
Pro Google takes aims at AWS Lambda with Cloud Functions Alpha testing a rival to Amazon's super-lightweight cloud app framework, although it only supports JavaScript for now 12 Feb
Pro VMware boosts BYOD with three new tools Employees get flexibility, IT gets security and control 11 Feb
Subscribers 0
Fans 0
Followers 0
Followers