At the 2015 World Future Energy Summit (WFES) in Abu Dhabi, United Arab Emirates (19-22 January), First Solar Inc of Tempe, AZ, USA, which makes thin-film photovoltaic modules based on cadmium telluride (CdTe) as well as providing ...
Nearly 75 percent of government IT budgets are staying flat or increasing, according to a survey by analysts at Gartner. This comes in opposition to a continuing drive, especially in the UK, to lower the cost of government IT contracts by ...
Companies with IT security strategies that focus mostly on complying with key standards are dangerously unprepared for emerging cyber threats, said security experts at the RSA Conference 2013 here this week. Over the past few years, the ...
Companies with IT security strategies that focus mostly on complying with key standards are dangerously unprepared for emerging cyber threats, said security experts. Over the past few years, the security strategies of many companies and ...
Tags: IT security strategies, emerging cyber threats, security strategies
Security company, FireEye, has announced a new threat protection platform designed to help enterprises deploy new security models to counter modern cyber attacks. Many traditional defences, such as firewalls and anti-virus, are not enough ...
HP on Monday unveiled its Big Data Security strategy, describing how combining the enterprise search and knowledge management resources from its Autonomy subsidiary with its ArcSight security-event and information management (SIEM) can ...
Tags: HP, Big Data Security Strategy, SIEM
An average of 96% of the top 100 paid mobile apps have been hacked, a study has revealed. Android is the most susceptible platform, according to the State of Security in the App Economy report by security firm Arxan Technologies. The ...
Tags: mobile apps, iOS apps, Google Android platform, Hackers
Current business security models fail to prepare for cyber threats in the face of highly sophisticated, powerful cyber attack tools that are no longer the preserve of nation states, as they filter down to a wider community of attackers. ...
Tags: security models, hackers, cyber attacks, Cyber criminals
Huawei Technologies said on Thursday it was verifying claims that its routers contained critical vulnerabilities, after security researchers disclosed alleged problems last weekend. "We are aware of the media reports on security ...
Tags: Huawei Technologies, routers, critical vulnerabilities, security
Only 8% of European companies plan to decrease spending on antivirus and antimalware in 2013, a survey of IT security purchasing intentions has revealed. Some 21% of more than 250 IT professionals polled by Computer Weekly and TechTarget ...
Tags: European companies, antivirus, IT security, TechTarget
Intrusion prevention systems -- security tools designed to stop problems even before they crop up -- have emerged as indispensable components of defense-in-depth security strategies. But a key success factor for the technology is it ...
Tags: Intrusion prevention systems, IPS, security tools, security strategies
Microsoft Windows 8 support for TPM Tipping point for TPM TPM gathers momentum The end of the password? TPM in action across all devices Since 2006, many new computing devices have been sold with a built-in trusted platform module ...
Tags: Microsoft Windows 8, TPM, password
Many organisations continue to rely on ineffective intrusion prevention systems (IPS) for defending information systems, says security firm Stonesoft. Advanced evasion techniques (AETs) – which combine several known evasion ...
RSA,the security arm of storage corporation EMC,today claimed that not one of its customers has been the victim of a successful cyber attack in the past 19 months. Speaking at RSA Conference Europe 2012,RSA president Tom Heiser said that ...