Akamai Media Cloud Workflow erfüllt die MPAA-Sicherheitsanforderungen

Durch den integrierten DRM-Schutz in Studioqualität, wie ihn die Urheberrechtsvorgaben der Motion Picture Association of America (MPAA) vorsehen, baut Akamai die Qualität und Skalierbarkeit bei der Auslieferung von Online-Medieninhalten weiter aus. Darüber hinaus hat Akamai ein...

Read More
94 percent of IT security professionals using third party apps on their mobiles

New poll shows rise in cloud-based and mobile apps employees is creating more islands of identity that are harder for IT to track and manage.

Read More
Spirent brings vulnerability scanning and load testing on a Cloud-based platform

ArmorHub and Blitz.io make Website and Application development fun, easy and inexpensive for anyone with a web presence.

Read More
C2C announces availability of Compliance365

New offering gives Office 365 users better control over secured archives.

Read More
Orange Business Services and Sia Partners analyse new ways of working in the digital era

Orange Business Services and the consultancy Sia Partners have released a position paper which...

Read More
iboss Network Security tracks data flow

Advanced behavioural data analysis detects threats through anomalies in data movement.

Read More
Beyond Compliance: using PCI DSS to improve overall security

By Andrew Avanessian, VP of Professional Services, Avecto.

Read More
Data breaches surge in 2014

SafeNet, Inc. has released the highlights from its SafeNet Breach Level Index (BLI) for the first...

Read More
Survey shows that European companies don’t have privilege management under control

Excessive admin rights & privilege are putting companies at risk and increasing the...

Read More
BT and Exostar to help life sciences organisations collaborate

Scientists engaged in collaborative initiatives can now securely access Transformative Cloud-based...

Read More
Wind River adds security boost

New Security Profile for Wind River Linux addresses growing security vulnerabilities as more...

Read More
The ‘threat’ of third party contractors

Vormetric has announced further analysis of its ‘Insider Threat' report, conducted in...

Read More
SureCloud bridges intelligence gap between eGRC and home-grown compliance systems

SaaS platform provides game-changing way for firms to swiftly comply with changes in the regulatory...

Read More
Chemring launches Bio-inspired Cyber Security System

Chemring launches Perception™, the industry first in class Bio-inspired network security...

Read More
LogRhythm kommentiert: Bank of England: Hacker soll Schwachstellen aufspüren

Die Gefahr ist real: Internetterroristen trainieren großangelegte Angriffe auf die...

Read More

Videos

Michael Akinla, Business Manager UK / Ireland / Nordics at Panduit, explains that, as increasing numbers of data centres are being developed with GPU-based compute as a key growth opportunity, factoring in...
Gina Archbold, Channel Business Manager at BlueSnap, provides an update on the company’s Partner Program - explaining how the BlueSnap global payment orchestration platform provides an integrated, single...
In this video, DCS talks to Octaipipe at the DCA's 10x10 2025
Avi Baum, CTO at Hailo, discusses why AI infrastructure needs are already shifting from centralized to edge, how telcos can evolve and future-proof their business to keep up with that transition, and what’s...

Expert Opinions

By Michael Hunger, VP of Product Innovation, Neo4j.
By David Knox, Global Director of Energy & Sustainability at Colt DCS.
By Jake Madders, Director and Co-Founder, Hyve Managed Hosting.