Skyhigh Networks exposes how filenames are pointing hackers to the data

Filenames act as Neon Signs to hackers

0
The quarterly Skyhigh Networks Cloud Adoption and Risk Report is now out and it shows that the filenames used by users are acting as neon signs for hackers. What makes the Skyhigh...
Storm Internet has navigated its way through the Cloud market (Image CRedit FreeImages.com/Patricia Dekker)

Navigating the STORMy cloud market

0
  The CSP (Cloud Service Provider) market has been changing for several years. Companies that could offer cloud solutions are being undercut by their larger competitors unable to compete with the scale...
Equinix Enterprise of the Future

What is the Enterprise of the Future?

0
Equinix publishes its latest research focusing on the Enterprise of the Future which focuses on how interconnected a company is. The research looked at 1,000 senior IT roles spread over 14 countries....
Blue Coat expand partner program by 7 Image credit: Freeimages.com/jayanta behera

Does Blue Coat have a blue ocean?

0
Blue Coat has announced an expansion to its ETM (Encrypted Traffic Management) partnership program with the addition of seven new companies to its ecosystem. eSentire, Gigamon, LogRhythm, ManagedMethods, Symantec, TopSpin Security and...
Intercede survey shows Millennials are more security savvy than thought

Millennials disappointed in cybersecurity

0
A study released by Intercede today says that: "Millennials in the U.S. and U.K. have almost entirely lost trust in government and business to protect their personal information online." Millennials are often...
Telecity adds Microsoft Office365 to Cloud-IX (Image Credit Freeimages.com/Darren Hester

Why Telecity added Microsoft Office365 ?

1
Telecity Group has announced the availability of Microsoft Azure ExpressRoute for Office365 via the Cloud-IX platform. This will allow customers to establish a private network connection between their own networks and...
Thales 2015 PKI Study

Is your PKI fit for purpose?

0
Thales has just published its 2015 PKI (Public Key Infrastructure) Global Trends Study carried out by the Ponemon Institute. Over 1500 IT and IT Security practitioners were surveyed across ten countries about...
computer-components- - Are IT and Procurement that different? Image Credit (Freeimages.com/Esteban Lifich - 1192101

Can IT learn lessons from Procurement?

0
Are Procurement and IT that different? We sat down with Chris Sawchuk, co author of the recent Hackett Group report entitled “World-Class Procurement Spends 17 Percent Less; Are Well on Their Way...
FinancialForce Apple Watch App (Source FinancialForce)

FinancialForce extend the Dream

2
With Salesforce's annual Dreamforce conference taking place in the US this week, FinancialForce has announced several improvements to their ERP solution. These can be divided into three areas, reporting and analytics, an...
Centrify survey shows poor Apple device management

Are your Apple devices a security risk?

0
Centrify survey shows that unmanaged Apple devices are exposing sensitive customer and corporate data. There has been a lot said about the security risks of Bring Your Own Device (BYOD). Despite this...

LATEST NEWS