As CEO of i2, Bob Griffin reminded his audience at the recent i2 EMEA User Conference held in Brussels, of what has changed at i2 during the past 12 months.
Continue reading i2 aims to 'accelerate your mission with transformational technologies'
As CEO of i2, Bob Griffin reminded his audience at the recent i2 EMEA User Conference held in Brussels, of what has changed at i2 during the past 12 months. Continue reading i2 aims to 'accelerate your mission with transformational technologies'
London, 24th August 2010 – Whilst the media seems pre-occupied with the problems of cybercriminals and hackers causing problems for organisations from outside their network, a survey just published shows that 23 per cent of UK employees will take customer lists and other sensitive data when they leave their employer. Continue reading Imperva says employee survey highlights dangers of insider threat
London and San Mateo, Calif., August 24, 2010 , An in-depth survey carried out amongst 100 of the elite IT professionals attending this year’s DEF CON 2010 Hacker conference in Las Vegas recently has revealed that hackers view the cloud as having a silver lining for them. Continue reading DEF CON survey reveals vast scale of cloud hacking – and the need to bolster security to counter the problem
The Liberal Democrats are taking advantage of Web 2.0 technology to help run their headquarters, improve communication within the party and share materials with campaigners across the UK. Continue reading The Liberal Democrats enter a new era for government and embrace Web 2.0
London, 28th July 2010 Trusteer, the leading provider of secure browsing services, today announced that it has added financial malware disinfection to its Rapport service. In addition to preventing Trojans like Zeus, Silon, Bugat, DBJP and zero day malware from tampering with website communications and transactions, Rapport now removes malicious code that attempts to attack browser sessions. Continue reading Trusteer Adds Free Financial Malware Removal to Rapport Secure Browsing Service
i2, the leading provider of intelligence and investigation software, has formed a formal partnership with leading risk intelligence specialist, World-Check. As a result, i2 customers can benefit from the ability to access highly structured information and create actionable intelligence faster. A new solution was announced here today at i2’s Europe, Middle East & Africa (EMEA) User Conference. Continue reading i2 and World-Check Combine World-class Analytical Tools with World-class Intelligence
The world of hacking has evolved into two major varieties: industrialized attacks and advanced persistent threats (APT). There has been a lot of discussion around the validity of APT recently some have even connected APT with panties. But APT is a real threat. So, what’s the difference between APT and industrialized hacking, and how should you respond? Continue reading A Tale of Two Hacks:
Rolling Meadows, Ill., US (9th June 2010), ISACA International Vice President Rolf von Roessing, CISA, CISM, CGEIT, has applauded the actions of Ireland’s Data Protection Commissioner in publishing a draft code of practice that requires incidents involving the theft or loss of personal data relating to more than 100 people to be notified to its office. Continue reading ISACA leader welcomes Irish Data Protection Commissioner's proposals on data theft or loss notifications
The British Library is the national library of the United Kingdom and is one of the world’s greatest research libraries. The purpose of the British Library is to retain the nation’s knowledge and memory and as such, every item that is deposited in the British Library is accessible for readers on site. Currently, it holds over 150 million items in different formats including books, magazines, newspapers, maps, patents, stamp collections and recordings. Continue reading British Library 2.0
NEW YORK , 25th May 2010 – Varonis Systems Inc., the leading provider of comprehensive data governance software, today announced Version 5.5 of DatAdvantage® and DataPrivilege®, a further evolution of the Varonis Meta-data Framework, which enables customers to identify sensitive unstructured and semi-structured data on their file systems, SharePoint Sites and NAS devices. Continue reading Varonis addresSes the explosive growth of unstructured and semi-structured data
Britain’s largest land manager, the Forestry Commission, has awarded Fujitsu a new five-year contract to maintain all of its ICT hardware across the Commission in England, Scotland and Wales. Fujitsu originally won the six-year contract to run the Forestry Commission’s IT in 2003. The new contract was won in a competitive tender through the Catalist framework. Continue reading Forestry Commission awards Fujitsu five year contract to manage IT estate
Public sector managers are living in challenging times when it comes to preventing data loss for their organisations. Compliance with security regulations has become a real headache for managers within the NHS, local and central government and other public sector bodies trying to manage their complexity whilst at the time battling with the ever growing pressure to reduce IT spending. Continue reading An ounce of prevention is worth a pound of cure
Slough, United Kingdom 1st February, 2010: Bringing advanced networking and monitor technology to the hospitality, meeting and conference, public sector and educational sectors; LG is revealing the latest addition to its successful N+ range at ISE 2010 – a wireless multi-monitor solution that will be available from mid 2010 onwards. Continue reading LG Launches New Wireless Network Multi-Monitor Solution
The Leeds Partnership NHS Foundation Trust provides services to 572,000 adults, across 62 sites in the Leeds area. The people under its care are vulnerable and the Trust strives to provide the best possible care and support to them. Continue reading Leeds Partnerships NHS Foundation Trust Installs Observer Suite for Preventative Network Health
|
Recent Comments