Imperva - News, Features, and Slideshows
Security services startup Sentrix mirrors customer Web sites in Amazon Web Services and Azure clouds in order to dynamically expand site resources during distributed denial of service attacks and keep the sites running until attackers exhaust their resources, give up or move on to easier targets.
By Tim Greene | 18 September, 2014 04:52
Skyhigh Networks Wednesday aired an offering that lets companies using the Box file-sharing service first have files checked for compliance by their existing data-loss prevention (DLP) equipment.
By Ellen Messmer | 04 September, 2014 02:04
A code-hosting and project management services provider was forced to shut down operations indefinitely after a hacker broke into its cloud infrastructure and deleted customer data, including most of the company's backups.
By Lucian Constantin | 20 June, 2014 00:33
The willingness to invest in new security start-ups is continuing at such a breakneck pace that start-ups still in stealth mode are getting snapped up by more established players before they even publicly introduce their security products and services.
By Ellen Messmer | 18 March, 2014 18:17
Hackers found security weaknesses that allowed them to overdraw accounts with Flexcoin and Poloniex, two websites that facilitate bitcoin transactions, and exploited them to steal bitcoins from the two services. The attacks put Flexcoin out of business and cost Poloniex's users 12.3 percent of their bitcoins.
By Lucian Constantin | 05 March, 2014 18:09
In this White Paper, IDC offers up some quantifiable benefits that Asian enterprises have observed as a result of deploying backup and recovery solutions. · Many enterprises are finding that the backup and recovery processes and technologies that they have implemented have not kept pace with the demands of the business · IDC identifies how organizations can experience savings and improvements from the deployment of different types of technologies · The benefits fall into three categories: storage environment cost savings; end-user productivity enhancements; and IT staff productivity optimization
- FTAcquisition Marketing ExceutiveNSW
- FTProgram Manager - Integration & SolutionsNSW
- CCTech Support | IT Services Firm - Ad hoc Projects - Echuca AreaVIC
- FTSearch/SEO/SEM/PPC - Multiple OpportunitiesVIC
- CCTech Support | IT Services Firm - Ad hoc Projects - Port Augusta / Whyalla AreaSA
- FTStudio Design ManagerVIC
- FTSearch/SEO/SEM/PPC - Multiple OpportunitiesNSW
This whitepaper describes how to gain flexible, end-to-end management of the ever-changing mobile workforce landscape with suitable Enterprise Mobility Management (EMM). • Employing best practices can set you on the right course for addressing current needs and planning for the future • Change is the only constant in the mobile workforce landscape with multiple new models per year, frequent OS updates and new vendors emerging • Employees are resistant to corporate security policies and corporate control if it impedes their productivity or personal privacy
- Melbourne IT eyes social media market with Tiger Pistol
- Building a non-distributed big data computing solution on Amazon Web Services
- Pressure mounts in Europe for strict net neutrality
- Use Uber? Snapchat? Google Maps? Now Twitter knows
- Opera pitches all-you-can-eat app stores to mobile operators
- Apple-IBM products in November? Not quite
- Amazon's Fire sale: Phone is now just $199 unlocked
- PoS malware also targeting ticket vending machines and electronic kiosks
- Oracle, Oregon tussle over whether federal court should hear Cover Oregon case
- First robot, networked tablets head to West Africa to fight Ebola
- HP's former CEO Carly Fiorina explores GOP presidential run
- 5 ways to tell a cloud poser from a cloud pro
- EU wants Google to apply 'right to be forgotten' delistings to global .com domain
- What to consider when negotiating a hybrid cloud SLA
- US lawmakers to Europe: Don't break up Google