As data volumes grow, virtualising the infrastructure helps a business streamline its processes, reduce its hardware footprint and manage costs. But without an apt data backup and recovery strategy, a virtual environment can’t be ...
Tags: Computer Products, Virtualisation, recovery tool, data woes
The Critical Metals Report: John, a recent Brookings Institution report suggested that greater collaboration between U.S. and Chinese companies would alleviate tensions over tightening rare earth markets. Is the proposed merger between the ...
Tags: Rare earth, Critical Metals, rare earth markets, REEs
The mobile-audio-device market has grown rapidly over recent years,producing consumers well used to scrutinising audio and less willing to compromise on quality.Average Joe has grown a set of golden ears,you might say.Reinforcing this ...
Tags: audio quality, mobile-audio-device, real-time wireless
If attackers want to get in to an organisation's information systems, they will, says Frank Coggrave, general manager for Europe at e-discovery firm Guidance Software. "Many IT departments still have their heads in the sand on this issue. ...
Tags: information systems, IT departments, security investments, Software
After backing off a controversial change to its Terms of Use policy,Instagram may have avoided a debacle but is still taking a big hit to its once glossy image. Analysts,however,say users are probably too addicted to what is becoming one ...
Tags: Instagram, social media sites, Facebook
Facebook Gifts, the new social gifting service launched by Facebook on Thursday, might encourage users to expose information like their home addresses, birth date, clothing or shoe size that could pose security and privacy risks, according ...
Tags: Facebook Gifts, social gifting service, Facebook, users, information
After gathering analysis of targeted attack data collected between February and September this year, Trend Micro found that 91 percent of targeted attacks involved spearphishing. This finding reinforces the company’s stance that ...
Tags: Email attacks, Malicious threats, targeted attacks, Trend Micro, network
Sourcefire announced today it has strengthened and expanded its FirePOWER appliance family, providing users with the unmatched ability to protect against sophisticated malware, advanced persistent threats (APTs) and targeted attacks. One ...
Tags: advanced malware protection, advanced persisted threats, APT, firepower
About 1 in 3 “mission-critical” applications are currently in the cloud, and this is expected to increase to 1 in 2 by 2015, according to a survey of 400 IT and business managers published today. The IT and business managers, ...
Tags: apps, cloud, data, mission critical, IT
Cyber espionage is?nothing new.So a report from the Defense Security Service(DSS)about efforts in foreign countries to steal U.S.technology,intellectual property,trade secrets and proprietary information might sound like just more of the ...
Tags: Cyber espionage, DSS, Defense Industry
Years ago the typical hacking scenario involved a lone attacker and maybe some buddies working late at night on Mountain Dew, looking for public-facing IP addresses. When they found one, they enumerated the advertising services (Web server, ...
Banking on extensive research in the R&D laboratory, Digitl Ink, a Cheshire, UK-based ink manufacturer, intends to launch two direct to fabric water-based ink varieties - Tex-AD and Tex-PG, for wide-format printers, by close of the ...
Tags: R&D laboratory, Digitl Ink, launch, ink varieties, Tex-AD, Tex-PG
Criminals broke into an Adobe server and provided two pieces of malware with a digital certificate that attest to them being legitimate code. As a result of the breach, the company will revoke the certificate next Thursday and will update ...
Tags: Adobe, Criminal, cyber crime, highlightedpost, malware
Advanced persistent threats (APTs) are real and all companies should be taking them seriously, says telecommunications company AT&T. In the past year, the company has set up an IT security team dedicated to researching APTs and making ...
In a Q&A with press at the RSA European conference today,RSA executive chairman Art Coviello revealed how criminals and nation states are working together to launch cyber attacks. Further reading RSA:No successful attacks on customers ...
Tags: cyber attack, RSA, predictive analytics, information sharing