- Agility23
- Analytics11
- API7
- Applications350
- AppSec1
- Artificial intelligence9
- Auto financing3
- Auto lending challenges1
- Automation17
- BIg Data4
- Blockchain2
- Business181
- BYOD7
- Cloud462
- Compliance1
- Covid-192
- Data119
- Data Protection36
- Datacenters195
- Datacentre12
- Digital24
- Digital Transformation144
- GDPR8
- Hybrid Application3
- Hybrid IT15
- Hyperconvergence18
- Investment2
- IOT18
- IT Infrastructure58
- IT Services16
- IT Transformation37
- Job10
- Management374
- Marketing207
- Mobility159
- Networks314
- Online conference13
- Productivity36
- Ransomware3
- Risk Managment1
- SAP4
- SAP1
- Security384
- Servers2
- Software82
- Solutions2
- Storage32
- Strategy33
- Tech87
- Unified Communications1
- Virtualisation18
- Workspace115
- Absolute Software5
- ADP23
- Aerohive6
- Akamai6
- Alert Logic3
- AMD4
- APC16
- APC by Schneider Electric Papers2
- Appsense9
- Arbor Networks4
- Arkadin3
- Arkeia1
- Arkoon4
- Arrow ECS2
- Aruba Cloud1
- Aruba HPE2
- Aruba Networks11
- Aspera8
- AtTask4
- Avaya5
- AvePoint3
- Avocent13
- baramundi17
- BEA Systems, Inc.10
- Binary Tree9
- Black Duck Software6
- Bluekiwi1
- BMC6
- BT3
- CA45
- Capgemini10
- Centrica5
- channeladvisor3
- Cisco26
- Cisco Intel9
- Citrix50
- Citrix-Microsoft2
- ClickSoftware1
- CloudBlue2
- Cloudera6
- Commvault14
- Computer Associates9
- Condusiv Technologies4
- Contentserv1
- Courion3
- CybelAngel4
- Dataiku1
- Dell - AMD1
- Dell - Intel vPro4
- Dell - Intel Xeon4
- Dell /vmware18
- Dell and Intel Enterprise Resource Centre8
- DELL EMC - MICROSOFT2
- Dell EMC Microsoft 101
- Dell Kace1
- Dell RadeonPro1
- Dell Technologies3
- Dell Technologies - Intel3
- Dell_Intel_built-in3
- Dell_intel-corei71
- Dell-Intel20
- Dell-tech_intel-vPro2
- dell/nutanix8
- DellEmc - Intel22
- DellEMC-XEON-Microsoft4
- Denodo3
- Diskeeper Corporation Europe1
- Double-take software / Vision Solutions4
- Dropbox8
- Druva5
- Eaton Electric1
- Electric Cloud1
- EMC14
- Ephesoft1
- Epson1
- Equinix13
- eVault5
- eWEEK Europe4
- F51
- F5 Networks37
- FICO3
- Flexera4
- Forcepoint20
- Forgerock10
- Fortinet3
- Frontrange5
- Gemalto1
- Gigamon12
- Google1
- GoToMeeting1
- Heat Software1
- Hootsuite3
- HP32
- HP / Intel11
- HPE Intel19
- Huawei4
- Ibexa1
- IBM223
- IFS7
- iGrafx1
- Ilex International4
- Imation4
- Imperva2
- Intel14
- INTEL1
- Intel MRS11
- Intel Security3
- Intel Xeon14
- Intermedia5
- Interxion1
- iPass3
- Ipswitch2
- Ipswitch Whatsup4
- Iron Mountain4
- Jama4
- Juniper1
- Kaminario4
- Komprise7
- Kyocera1
- LANdesk Software2
- Lenovo1
- Lifesize2
- Limelight3
- Link111
- Logmein5
- Lombardi3
- Loopup1
- Lumen2
- Lumension Security6
- Magento5
- Malwarebytes5
- MatsSoft3
- McAfee9
- MicroFocus3
- Microsoft19
- Microsoft US3
- Mimecast8
- Mitek1
- MobileIron12
- NaviSite19
- NEC2
- Neo Technology9
- Netapp6
- NetIQ3
- NetMediaEurope10
- Network Instruments1
- Nortel Networks France1
- Opayo5
- Opentext4
- Oracle27
- Orbit Defence1
- PagerDuty9
- Palo Alto Networks13
- Panda Security2
- Parallel2
- Percipient1
- plan1
- Plantronics11
- Polycom26
- PTC2
- Pulsant45
- Pure Storage25
- Quadient3
- Quest Software5
- Qumu1
- Rackspace6
- Rakuten1
- Rally Software2
- Recorded Future1
- Red Hat30
- RES Software8
- Response Communications - Aerohive1
- Response Communications - Blue Cat1
- Response Communications - Gigaom1
- Response Communications - Nimble Storage1
- Response Communications - Palo Alto1
- Response Communications - SilverPeak2
- RingCentral1
- Riverbed31
- Safenet4
- Sage Pay11
- SAP27
- Savvis2
- Schneider Electric9
- Script Logic3
- SDL8
- Secunia4
- Sennheiser1
- SentinelOne1
- ShoreTel2
- Siemens5
- Sierra Wireless2
- SilverPeak7
- Sitecore3
- Slack5
- Solarwinds1
- SolidWorks3
- Sonicwall1
- SuccessFactors5
- SugarCRM3
- SUSE6
- Sybase14
- Symantec22
- T-Systems1
- Telecity1
- Tenable4
- Thawte4
- Toshiba Intel1
- Trend Micro1
- Trifacta1
- Veeam12
- Veracode28
- VeriSign10
- Veritas11
- Vidyo5
- VMware107
- VMware AirWatch12
- Vodafone4
- Webroot25
- Websense7
- WhatsApp1
- Wind River4
- Zeenea1
- Ziff Davis Enterprise1
Win the Digital Experience Race: On Demand Webinar
Join us to think beyond pure eCommerce to be customer-centric A recent study from Pew Research revealed that more than 70% of customers stop doing business with a brand when their online experience is poor. Avoid the trap of focusing on your e-shop when your B2B sales strategy needs much more. As the Covid crisis
Stopping Credential Leaks: A Race Against Time
Stolen credentials are the top hacking tactic for the fourth consecutive year, according to the latest Verizon Data Breach Investigations Report. If this isn’t enough to get the attention of cybersecurity professionals, the report further states that 37% of all data breaches are the result of used or stolen credentials. Each combination of a password
How to Manage Third-Party Digital Risk
The adoption of digital transformation, cloud computing, and outsourcing of physical IT infrastructure streamlined processes and lowered costs; however an unintended consequence is enterprise digital assets are now in the hands of third, fourth, and Nth parties — far outside the corporate security perimeter. Download this whitepaper to learn: – How digital risk is shifting
Full Body Exposure: CybelAngel Analysis of Medical Data Leaks
CybelAngel Analyst Team detected medical devices leaking more than 45 million unique imaging files on unprotected connected storage devices with ties to hospitals and medical centers worldwide. In most cases, the identified leaking device was a Network Attached Storage (NAS). NAS are inexpensive storage solutions used by individuals and small companies, as opposed to renting
Are Unprotected Cloud Databases Leaking Your Data?
Digital Risk is Shifting to the Cloud Cloud services are frequently associated with digital transformation and innovation; however, these services also expand cyber attack surfaces for threat actors to exploit. According to Oracle’s 2020: Top Ten Cloud Predictions1, 7 out of 10 organizations will keep business-critical data in the cloud. While moving to cloud apps
Common Policies or Native Services— Addressing Multi-Cloud Security
Native cloud services work—up to a point. They speed development of applications that meet the needs of a majority of customers. However, native services are specific to a single cloud provider and they lack the flexibility to accommodate customers whose needs don’t align with those of the majority. Integrating third party vendors that offer common
Making the Most out of Analytics
The complexity and distribution of modern applications across cloud and private platforms creates challenges in visibility, analytics, and troubleshooting. By keeping data siloed or restricted to regional owners or functional teams, we expose applications to critical negative business impacts. Merging and finding relationship between distributed analytics, like application telemetry, events, and logs provides new insight
Application Security Solutions
Why You Need Application Security Every company is now a software company. Companies of all sizes in all industries are churning out applications more rapidly than ever in order to move faster; better communicate with customers, prospects and partners; and differentiate themselves in this digital world. To keep pace, organizations are not just developing more
When AppSec Integration Threatens Development, How Do You Safely Sustain Innovation?
You want AppSec tools in your development process, but anything less than full integration undermines your program’s effectiveness. Getting the right resources into developers’ hands typically requires: • Procuring new hardware: Your security team must source hardware, and then install application software and configure databases. • Building integrations: Next, security moves on to building connections—and
Understanding Your Open Source Risk
The demand on software development teams is greater than ever. With the cultural move towards DevOps, the implementation of CI/CD systems, and the desire to operate in an agile manner, developers are being asked to push out more software — and in shorter periods of time — than ever before. In turn, developers are increasingly