Please turn on your JavaScript for this page to function normally.
Open source self-service cloud portal

ScaleXtreme released free open source software for companies to build internal cloud dashboards and self-service portals for developers and other end-users. The technology …

How to prevent a botnet infection?

The research team at e-mail security provider Eleven, published five tips today to help users prevent a botnet infection on their computer. Botnets are groups of hijacked …

Dissatisfaction with the current state of backup

ExaGrid Systems announced the results of a survey of 1,200 IT managers which shows widespread dissatisfaction with the capabilities of many existing backup systems to keep up …

Most 5 year olds already use an Internet enabled device

Children as young as five have easy access to an internet enabled device. A One Poll study of 2,000 parents of children aged 5 to 15 also shows six parents in ten frequently …

F-Secure Mobile Security protects Android TVs and set-top boxes

F-Secure launched a new version of F-Secure Mobile Security which features support for standard Android devices including TVs and set-top boxes. The new version also comes …

eIQnetworks releases next generation SIEM

eIQnetworks announced SecureVue NGS, a next-generation SIEM solution that provides log management, event management, network behavioral analysis and intelligent security …

Mobile banking trends and hidden risks

While mobile banking apps are growing quickly in popularity, 68 percent of smartphone owners who have not yet adopted these apps are holding back due to security fears, while …

Solutions for application and network performance management

AppNeta launched its unified solutions for End User Experience Monitoring including full-stack application performance tracing and network performance insight. As business …

DellKACE unveils appliance for improved endpoint security

Dell KACE unveiled the latest version of the Dell KACE K1000 Management Appliance, which includes expanded visibility into the network through support for new operating …

Top words cybercriminals use in fake emails

The top words cybercriminals use create a sense of urgency, to trick unsuspecting recipients into downloading malicious files. The top word category used to evade traditional …

Ethics of Big Data

What are your organization’s policies for generating and using huge datasets full of personal information? Ethics of Big Data examines ethical questions raised by the …

Big Data grows as data security shrinks

A report published by PricewaterhouseCoopers (PwC) has revealed that despite the growing issue of “Big Data,” most organisations are actually keeping looser tabs …

Don't miss

Cybersecurity news