SecurityBrief UK - Technology news for CISOs & cybersecurity decision-makers

Forrester stories - Page 28

Deaf man

Exclusive - IoT: Are we deaf to the machines?

Thu, 12th Jan 2017
#
data analytics
#
martech
#
iot
From the devices in our homes, our cars, our work and even to the devices we wear, they are all talking - why are we wasting this useful information?.
Thinkstockphotos 617753048

Symantec's cyber security predictions for 2017

Wed, 7th Dec 2016
#
cybersecurity
#
symantec
#
banking
security experts Symantec have compiled a list of 10 security threat predictions for 2017 as cybercriminals change tactics. Here's what can we expect.
Thinkstockphotos 614137876

Rogue nations, IoT, fileless malware and drones: A new era of cybercrime in 2017

Mon, 5th Dec 2016
#
malware
#
ddos
#
drones
Hack forecasts for 2017: experts warn of a surge in fileless malware, IoT exploits, and politically-charged cyber thefts.
Thinkstockphotos 137188913

Cloud exchanges clearing path to better network performance

Mon, 5th Dec 2016
#
hyperscale
#
dc
#
iaas
As the enterprise increasingly adopts cloud, more business-critical applications are moving into cloud environments.
Thinkstockphotos 91356822

Nimble Storage and Lenovo form data center super group

Wed, 19th Oct 2016
#
storage
#
hyperscale
#
dc
Nimble Storage joins forces with Lenovo to revamp data centres, promising a new era of efficiency and predictive analytics-led infrastructure.
Thinkstockphotos 579430532

CrowdStrike brings the power of signature-less machine learning to VirusTotal

Mon, 29th Aug 2016
#
endpoint protection
#
ai security
#
edr
CrowdStrike has delivered the first signature-less machine learning engine to be incorporated into VirusTotal's malware scanning service.
Img mmodwyxcn4ue9vftappwywsx

Dell leading the pack in identity management and governance

Mon, 30th May 2016
#
network infrastructure
#
iam
#
cybersecurity
Dell's One Identity Manager has garnered leader status in the latest Forrester Wave for identity management and governance. So who else made the cut?.
Winner winner chicken dinner

Palo Alto is winning the malware analysis game

Mon, 2nd May 2016
#
malware
#
advanced persistent threat protection
#
cybersecurity
Palo Alto Networks' WildFire tops Forrester's automated malware analysis, defining the future of cyber defence strategies.
Cyber attack privelege

Your IT infrastructure could be taken over in just 12 minutes

Tue, 15th Mar 2016
#
it industry
#
cyberark
#
cyber attacks
The frequency and sophistication of cyber crime is growing everyday in line with the increasingly digital workplace.
Flag

Aussie businesses struggling to stay relevant in digital era

Fri, 11th Mar 2016
#
digital transformation
#
thoughtworks
#
partners
Aussie firms at risk in the tech age, warned at Melbourne's ThoughtWorks Live event to embrace digital or face obsolescence.
Threats

FireEye extends threat intelligence for enterprise

Tue, 13th Oct 2015
#
breach prevention
#
fireeye
#
threat intelligence
The release enables enterprises to adapt endpoint protection utilising new visibility into their endpoint and insight from cloud and real-time feeds.
Intel

Intel makes $100m investment into OpenStack adoption

Tue, 25th Aug 2015
#
open source
#
openstack
#
intel
Intel and Mirantis, the pure play OpenStack company, have entered into a strategic technology and investment collaboration.
Enterprise needs

Accellion responds to growing security and governance needs

Mon, 10th Aug 2015
#
dlp
#
breach prevention
#
cybersecurity
Mitigating risk and demonstrating compliance with industry regulations is becoming increasingly important in corporate boardrooms, says Accellion.
Dell solutions tour

Dell invites you to meet the brightest minds in IT

Mon, 4th May 2015
#
network infrastructure
#
it managers
#
dell technologies
Join the Dell Solutions Tour in Perth and Adelaide on May 13 and May 26, an exclusive event brought to you by Dell.
Threat landscape

The current threat landscape, according to Dell

Wed, 15th Apr 2015
#
ddos
#
network infrastructure
#
cybersecurity
Dell warns of surging POS malware and cyber threats against payment systems in its latest threat landscape analysis.
Plan b

Plan B: Improving your recovery capability

Tue, 19th Aug 2014
#
dr
#
cloud services
#
forrester
Backup is only as good as its ability to be recovered. Plan B's Ian Forrester outlines how to ensure recovery.
Symantec

Symantec: New era of 'Mega Breaches' signals bigger payouts for cyber criminals

Sat, 17th May 2014
#
dlp
#
cybersecurity
#
symantec
After lurking in the shadows for the first ten months of 2013, cyber criminals unleashed the most damaging series of cyber attacks in history.
Dell logo 1024x678 1

Dell unveils expanded security portfolio to partners...

Fri, 18th Apr 2014
#
network infrastructure
#
cybersecurity
#
dell technologies
Dell has unveiled new security services and solutions to protect corporate networks, critical data and devices at the Dell Enterprise Forum event.
467507401

Symantec: 552 million identities exposed in 2013...

Thu, 10th Apr 2014
#
malware
#
dlp
#
cybersecurity
During 2013 cyber criminals unleashed the most damaging series of cyber attacks in history, with 552 million identities exposed during the calendar year...
Rain cloud swifts creek 0107

The cloud community faces industrial scale challenges...

Wed, 5th Mar 2014
#
saas
#
virtualisation
#
uc
The cloud industry faces complex challenges requiring cross-discipline expertise. Collaboration via the CloudEthernet Forum is key, says President James Walker.