LATEST POSTS
Comments Off on Risk assessments limited breaches in 2012
A new report from IT security assessment provider Redspin reveals two ways to look at health data breaches that occurred last year. On one hand, the number of ......
Comments Off on iPhone Vulnerability: Return of the Lock Screen Bypass
Silver Sponsor: Skybot. On-Demand: Plugging the Leaks -- Finding and Fixing the IT Security Holes in your Enterprise In this virtual event presented by Dark ......
Comments Off on Bad outsourcing decisions cause 63% of data breaches
Another problem, he said, is that it is very rare for those responsible for IT security within an organisation to be involved in the procurement process....
Comments Off on QTS moves into Dallas-Fort Worth market
QTS has bought a former semiconductor plant in the Dallas-Fort Worth metro it plans to turn into a data center for an undisclosed sum. This is the Overland Park, ......
Comments Off on NetApp’s Results Driven By Growing Flash Adoption And Software …
NetApp designs solutions for storing, managing and protecting business data through enterprise storage and data management software, and it also provides ......
Comments Off on Amazon Launches Data Warehouse Service Redshift
In a continued bid to gain enterprise market share for storage, Amazon Web Services (AWS) officially launched Redshift, a fully managed, petabyte-scale data ......
Comments Off on Ongoing Operations Now Assists Businesses Leverage Cloud and Virtualization
Ongoing Operations, quickly becoming a successful business continuity CUSO, now assists businesses leverage Cloud and virtualization for disaster recovery ......
Comments Off on Research and Markets: Global Server Virtualization Market 2012-2016
TechNavio's analysts forecast the Global Server Virtualization market to grow at a CAGR of 31.07 percent over the period 2012-2016. One of the key factors ......
Comments Off on Opera aquires mobile video optimiser Skyfire
Skyfire's Rocket Optimizer software allows mobile operators to leverage cloud computing to optimise video and other multimedia content. Essentially, it enables ......
Comments Off on The double-edged sword of Cloud computing in Critical Information …
ENISA, the EU's information security agency, has launched a new report looking at cloud computing from a critical information infrastructure protection (CIIP) ......