Imperva - News, Features, and Slideshows
Security services startup Sentrix mirrors customer Web sites in Amazon Web Services and Azure clouds in order to dynamically expand site resources during distributed denial of service attacks and keep the sites running until attackers exhaust their resources, give up or move on to easier targets.
By Tim Greene | 18 September, 2014 04:52
Skyhigh Networks Wednesday aired an offering that lets companies using the Box file-sharing service first have files checked for compliance by their existing data-loss prevention (DLP) equipment.
By Ellen Messmer | 04 September, 2014 02:04
A code-hosting and project management services provider was forced to shut down operations indefinitely after a hacker broke into its cloud infrastructure and deleted customer data, including most of the company's backups.
By Lucian Constantin | 20 June, 2014 00:33
The willingness to invest in new security start-ups is continuing at such a breakneck pace that start-ups still in stealth mode are getting snapped up by more established players before they even publicly introduce their security products and services.
By Ellen Messmer | 18 March, 2014 18:17
Hackers found security weaknesses that allowed them to overdraw accounts with Flexcoin and Poloniex, two websites that facilitate bitcoin transactions, and exploited them to steal bitcoins from the two services. The attacks put Flexcoin out of business and cost Poloniex's users 12.3 percent of their bitcoins.
By Lucian Constantin | 05 March, 2014 18:09
In this White Paper, IDC offers up some quantifiable benefits that Asian enterprises have observed as a result of deploying backup and recovery solutions. · Many enterprises are finding that the backup and recovery processes and technologies that they have implemented have not kept pace with the demands of the business · IDC identifies how organizations can experience savings and improvements from the deployment of different types of technologies · The benefits fall into three categories: storage environment cost savings; end-user productivity enhancements; and IT staff productivity optimization
- FTProgram Manager - Integration & SolutionsNSW
- CCTech Support | IT Services Firm - Ad hoc Projects - Port Augusta / Whyalla AreaSA
- FTStudio Design ManagerVIC
- CCWeb / Mobile Developer - Magento - HTML5, CSS - Excellent CMS SkillsNSW
- FTSearch/SEO/SEM/PPC - Multiple OpportunitiesNSW
- FTAcquisition Marketing ExceutiveNSW
- FTStudio Design ManagerVIC
- FTSenior SEO ManagerNSW
- FTChief Information Officer - CSIROACT
This whitepaper describes how to gain flexible, end-to-end management of the ever-changing mobile workforce landscape with suitable Enterprise Mobility Management (EMM). • Employing best practices can set you on the right course for addressing current needs and planning for the future • Change is the only constant in the mobile workforce landscape with multiple new models per year, frequent OS updates and new vendors emerging • Employees are resistant to corporate security policies and corporate control if it impedes their productivity or personal privacy
- UpCloud bets on storage performance, US datacenter to dent market
- Critical XSS flaws patched in WordPress and popular plug-in
- Grocers, retailers gobble up Apple Pay in time for holidays
- EU net neutrality legislation under threat from Italian proposals, says rights group
- Molecular flash memory could store massive data
- Google, Rockstar reach deal to settle lawsuit over Nortel patents
- NSA chief says cyberattacks on industrial systems are his top concern
- Intel plans 3D NAND flash next year for 'as much storage as you want'
- Telstra deploys 4G to 50 neglected rural sites
- More mobile broadband spectrum possible for emergency services
- Governments act against webcam-snooping websites
- Google: Would you pay to not see ads on favorite websites?
- Facebook's alternative PHP engine attracts Web service providers
- Intel planning thumb-sized PCs for next year
- Microsoft drops Dropbox into Office Mobile for Android