Revelations over the U.S. National Security Agency’s Prism surveillance programme have much of the general public in uproar, but in terms of the controversy’s impact to enterprise IT, some CIOs have measured, albeit watchful reactions.
Bank of England ranks cyber-attacks above Eurozone crisis as biggest threat
Cyber-attacks have risen to the top of the list of threats for UK banks according to the Bank of England’s director of financial stability, Andrew Haldane, but understanding and management of the risk is still at an “early stage”.
Imation unveils Nexsan Assureon next-gen object store
Imation this week unveiled its next-generation object store, the Nexsan Assureon secure automated archive solution, which, the vendor said, cost-effectively consolidates storage tiers, secures data and simplifies storage management.
Google detects phishing attacks in Iran ahead of elections
Google has detected large-scale phishing attacks targeting users in Iran, ahead of presidential elections in the country. The company has …
WWDC: Safari gets energy-efficient update in Mavericks
When OS X Mavericks arrives later this year, a new version of Safari will come along for the ride. Apple’s latest Web …
Reseller celebrates channel champions at Partner Excellence Awards
The channel community came together at Emirates Towers last night for the fourth annual Reseller Partner Excellence Awards, sponsored by Octagon.
By definition
There may have been a few people who spat out their coffee the morning they read that EMC had unveiled …
Ticking time bomb
The last year has shown more than ever how careful businesses need to be with their data. However, recent reports …
Unstructured data: Can you crack the code?
A simple motive for code cracking has always been the benefits of what lies beneath the complexity. As with the universe-load …
How to protect your PC from PRISM surveillance
Thursday afternoon, a bombshell dropped: Two leading reports claimed that the U.S. government has been spying on emails, searches, Skype calls, and …
The essentiality of optimising networks
Global demand for advanced broadband technology remains strong. In the last two decades, the Internet has become a necessity in …
Spectrami hosts TechCafe workshop with Fidelis in Riyadh
Spectrami recently held a TechCafe workshop with General Dynamics Fidelis Cybersecurity Solutions to address the concerns over IT security attacks …
Zscaler fixes BYOD risk with new mobile traffic cloud filtering
Zscaler has added mobile security to its arsenal of cloud-based security services, which the firm is pitching as a flexible …
Prism leaker steps forward, cites ‘massive surveillance machine’
The person responsible for disclosing details on the growth of U.S. government surveillance programmes that exploded into public view last …
Red Hat’s OpenShift PaaS goes live
After two years of beta testing, the Red Hat OpenShift Online platform as a service (PaaS) has been pressed into commercial use, …
IBM to acquire SoftLayer Technologies
IBM has announced a definitive agreement to acquire SoftLayer Technologies, the world’s largest privately held cloud computing infrastructure provider. The acquisition …
Red Hat packages newer versions of Ruby, Python
Red Hat has put out a beta release of Software Collections 1.0, in a bid to let developers use newer …
Microsoft, US feds disrupt Citadel botnet network
Microsoft and the U.S. Federal Bureau of Investigation have taken aim at a botnet network based on malware called Citadel …
Android anti-virus products a big flop, researchers say
Android smartphones and tablets are under attack, and the most popular tools developed to protect them are easily circumvented, according …
Businesses told to give up data when NSA calls
Businesses that receive a court order for data similar to the one reportedly handed to Verizon by an intelligence agency have no …