Network security management
-
News
24 Jul 2024
WhatsApp and Signal messages at risk of surveillance following EncroChat ruling, court hears
Defence lawyers seek leave to appeal a decision by the Investigatory Powers Tribunal that the National Crime Agency lawfully obtained warrants to intercept messages sent over an encrypted phone network Continue Reading
-
Feature
23 Jul 2024
Enhancing mobile app security with behaviour-based biometrics
Behavioural-based biometrics offer tantalising advantages over more traditional biometric solutions. Learn about some of the benefits and potential challenges for safe and secure implementation Continue Reading
-
News
16 Jun 2017
North Korean Lazarus botnet linked to WannaCry attack
US-Cert puts out an alert on DeltaCharlie, a distributed denial of service tool from North Korean hacker group Lazarus Continue Reading
-
News
08 Jun 2017
Islamic State supporters shun Tails and Tor encryption for Telegram
Confidential communications show terror group’s supporters are turning to simple mobile phone messaging apps to exchange messages and distribute propaganda Continue Reading
-
E-Zine
25 May 2017
CW Nordics: The trouble with connected things
In this issue, Finnish cyber security expert Mikko Hyppönen talks about security in the Nordics, Russia and the trouble with connected devices. Also read how Icelandic airline Wow Air averted disaster through the use of application performance monitoring software when it embarked on a major expansion. And find out how, since December 2015, anyone playing popular sandbox game Minecraft has been able to build their worlds on the actual map of Sweden. Continue Reading
-
E-Zine
23 May 2017
Global ransomware attack could be a security wake-up call
In this week’s Computer Weekly, we look at the global WannaCry ransomware attack that struck the NHS and spread across 150 countries – will it be the wake-up call that finally makes organisations take cyber security seriously? We find out how Moscow is leading the way in smart city digitisation. And our latest buyer’s guide examines customer experience management. Read the issue now. Continue Reading
-
News
22 May 2017
Windows 7 accounts for most WannaCry infections
Statistics show that computers running Windows 7 accounted for the biggest proportion of machines infected with the WannaCry ransomware, while NHS suppliers are blamed for hampering patching by NHS trusts Continue Reading
-
News
19 Apr 2017
Skype most popular communication channel for cyber criminals
The cyber criminal network is truly global and collaborative, making use of popular messaging services, a study has revealed Continue Reading
-
E-Zine
13 Apr 2017
CW Middle East: UAE faces IT recruitment challenge
In this issue, read how organisations in the UAE face a challenge to attract and retain top-quality CIOs and other key IT staff as the region seeks to tackle a technology skills gap. Also, Dubai’s Roads and Transport Authority has revealed that plans to unveil passenger-flying cars are in the final stages, with the initiative expected to launch in July 2017. Meanwhile, the UAE is mirroring global trends by eagerly adopting virtual reality technology. Continue Reading
-
News
11 Apr 2017
Security as a service on the rise in the UAE
Organisations in the United Arab Emirates are increasingly turning to security services Continue Reading
-
News
06 Apr 2017
Interview: F-Secure’s Mikko Hyppönen on the Nordics, Russia and the internet of insecure things
Computer Weekly sat down with Finnish cyber security expert Mikko Hyppönen to talk about security in the Nordics, Russia and the trouble with connected devices Continue Reading
-
News
28 Mar 2017
Threats grow in Saudi Arabia’s cyber sector
Saudi Arabia's wealth makes it an attractive target for cyber criminals, but what have been the recent trends in cyber crime? Continue Reading
-
News
20 Mar 2017
IBM cognitive assistant to help manage and secure devices
IBM has announced a cognitive assistant powered by IBM Watson to help businesses manage and secure endpoints, including devices making up the internet of things Continue Reading
-
E-Zine
16 Mar 2017
CW ASEAN: Raising national security standards
In this month’s CW ASEAN, we describe how Singapore is improving its cyber security defenses and preparations through a partnership with British security company BAE Systems. We also find out why the Thai military plans to recruit civilian cyber warriors and we take a look at evolving security approaches. Read the issue now. Continue Reading
-
E-Zine
15 Mar 2017
CW ANZ: Take cover from cyber threats
In the latest issue of CW ANZ we focus on security, with analysis of why Australian organisations are not sold on cyber insurance. It certainly isn’t a lack of cyber attacks – Australia is, in fact, making cyber security headlines for the wrong reasons. We also take a look at the need for organisations to meet IoT security challenges head-on. Read the issue now. Continue Reading
-
E-Zine
09 Mar 2017
CW Europe: Technology poses new risks to jobs, economies and society
Rapid advances in technology could have destabilising effects on employment and economic growth, and could exacerbate social unrest, the World Economic Forum (WEF) warned. Society’s failure to keep pace with technology change was a key risk under discussion at Davos in January. Continue Reading
-
News
27 Feb 2017
Citizen Love: the story of an ordinary family's fight with the US government
Finnish documentary makers Raimo Uunila and Lauri Danska tell the behind-the-scenes story of activist Lauri Love’s battle with the US government – and the impact of the case on his family Continue Reading
-
News
24 Feb 2017
Banking malware, DDoS, ransomware and CEO fraud top UK cyber threats
Businesses need to be aware of the value of their data, how that data is likely to be attacked, and how to defend against particular attacks, says leading UK cyber cop Continue Reading
-
Opinion
20 Feb 2017
Security Think Tank: Risk of DNS attacks goes beyond websites
What are the main security risks associated with DNS and how are these best mitigated? Continue Reading
-
News
14 Feb 2017
Major DDoS attacks see huge increase, says Akamai
Akamai’s State of the Internet/Security Report for the fourth quarter of 2016 finds that distributed denial of service attacks larger than 100Gbps are rapidly increasing as more IoT devices are compromised Continue Reading
-
News
26 Jan 2017
Security spending leaving data vulnerable, study finds
Cyber breaches are increasing despite increased security spending, a study shows, highlighting that security investment decisions are not aligned with actual cyber threats Continue Reading
-
News
12 Jan 2017
TechUK launches framework to build public trust in the IoT
Tech sector association techUK wants to help overcome public distrust in the internet of things Continue Reading
-
Feature
09 Jan 2017
Secure IoT before it kills us
Experts say more must be done to mitigate the potentially catastrophic threats presented by connected devices Continue Reading
-
News
03 Jan 2017
Three-quarters of enterprises collecting IoT data, says 451 Research
A study of IoT buying plans by analysts at 451 Research shows robust growth ahead during 2017 Continue Reading
-
News
23 Dec 2016
Top 10 networking stories of 2016
A look back at Computer Weekly’s most-read networking stories of 2016 Continue Reading
-
News
21 Dec 2016
European court delivers blow to Snoopers’ Charter
Parts of the controversial Investigatory Powers Act relating to the bulk collection of communications data have been ruled unlawful by the European Court of Justice Continue Reading
-
E-Zine
15 Dec 2016
European law enforcement seeking smart ways to fight cyber crime
Cyber criminals are always likely to be better resourced than law enforcement. Now, national and regional police forces in Europe are switching tactics to even the odds. Under-resourced law enforcement needs a smarter approach as cyber crime becomes increasingly prevalent and sophisticated, backed by the money and expertise of organised crime groups set up and run as well-resourced and efficient professional business organisations. Cyber crime operations typically have teams dedicated to looking at open source intelligence, targets’ physical environments, weaknesses in supply chains, and potential collaborators inside target organisations to enable sophisticated, blended attacks that involve a combination of actions against a range of vulnerabilities, making them difficult to detect and defend against. Continue Reading
-
News
07 Dec 2016
40 firms to trial IBM Watson cognitive computing for cyber security
Forty companies sign up to apply IBM’s Watson cognitive computing systems to cyber security, but threat intelligence experts caution against total reliance on such systems Continue Reading
-
News
05 Dec 2016
Top 10 ANZ enterprise IT stories of 2016
Here is a rundown of Computer Weekly’s most popular ANZ enterprise IT articles for 2016 Continue Reading
-
News
02 Dec 2016
Academics link payment card vulnerability to Tesco Bank cyber heist
UK academics uncover a vulnerability in online payment systems, which they say could have been used in the Tesco Bank cyber heist Continue Reading
-
News
22 Nov 2016
Alleged hacker Lauri Love’s ‘life will be destroyed’ under Trump regime
Supporters fear for activist Lauri Love if his extradition to face hacking charges to the US goes ahead Continue Reading
-
E-Zine
15 Nov 2016
Counting the cost of financial cyber crime
In this week’s Computer Weekly, the cyber security of banks is under scrutiny after an attack on Tesco Bank leads to millions lost in fraudulent transactions. Our latest buyer’s guide, on server operating systems, looks at the new features in Windows Server 2016. And Coca-Cola explains how a move to the cloud is helping motivate staff. Read the issue now. Continue Reading
-
E-Zine
03 Nov 2016
CW ASEAN: SMEs present security weakness
In this month's CW ASEAN, we look at how the cyber security defences at small and medium-sized enterprises in Southeast Asia may have some vulnerabilities, resulting in cyber security attacks on the large corporations they work with. We also consider the need to educate users of smartphones and tablets across the region as card fraud rates rise, with high use of mobile devices considered a contributing factor. Read the issue now. Continue Reading
-
E-Zine
03 Nov 2016
CW ANZ: Using gamification to build cyber security skills
In this month's CW ANZ, we look at how PwC is using an online game to give its customers first-hand experience of what it means to face a cyber attack. We also look at how identity is gaining greater prominence in the security debate in Australia as the DTO takes the wraps off plans for a national identity system. Read the issue now. Continue Reading
-
E-Zine
25 Oct 2016
25 years of Linux
In this week’s Computer Weekly, 25 years after Linus Torvalds released the Linux kernel, we look at how the open-source operating system has influenced modern-day IT. Our new buyer’s guide covers the fast growing technology of object storage. And we examine the rise of corporate wireless networking. Read the issue now. Continue Reading
-
E-Zine
20 Oct 2016
Reinventing Bahrain’s Kanoo Group through digital technology
In this quarter’s CW Middle East ezine, we feature the IT journeys of three companies in the region with detailed analysis of recent IT projects that were designed to support business transformation in a changing world. We hear how Bahrain-based conglomerate Kanoo Group is dealing with a company-wide digital transformation, Zahid Group’s biggest-ever IT investment, and how Rotana Hotels is centralising security. Continue Reading
-
News
19 Oct 2016
Snowden: the IT analyst turned whistleblower who exposed mass surveillance
Oliver Stone's biopic on Edward Snowden reaches the heart of the ethical crisis posed by mass surveillance for the state and ordinary citizens Continue Reading
-
News
18 Oct 2016
Saving Lauri Love: activists plan their next move
An eclectic bunch of activists, charity workers and reformed hackers spent a rainy Sunday afternoon plotting their next move in a campaign to save Lauri Love from extradition to the US on hacking charges Continue Reading
-
News
29 Sep 2016
NGOs challenge UK and US mass surveillance in human rights court
Privacy International, Liberty and the American Civil Liberties Union are among 10 human rights groups backing a landmark challenge to mass surveillance in the European Court of Human Rights Continue Reading
-
News
16 Sep 2016
Alleged hacker Lauri Love can be extradited to the US, court rules
Westminster Magistrates’ Court has ruled that alleged hacker, Lauri Love, can be extradited to the US, where he could face a 99-year prison sentence Continue Reading
-
Feature
16 Sep 2016
Lauri Love: the student accused of hacking the US
How did a brilliant but fragile computer science student from a rural English town end up facing life imprisonment in the US? Computer Weekly speaks to Lauri Love Continue Reading
-
News
12 Sep 2016
MaidSafe secure internet concept enters testing phase
Scottish internet startup MaidSafe brings its vision for a more private and secure approach to the web a step closer to reality Continue Reading
-
News
31 Aug 2016
Evidence of DNS tunnelling in two-fifths of business networks
Cyber criminals are capitalising on the failure of many businesses to examine their DNS traffic for malware insertion and data exfiltration, according to Infoblox Continue Reading
-
News
14 Jul 2016
CIO Interview: Elly Resende, CIO, Rio 2016 Olympics
As Rio de Janeiro gets ready to host the Olympics, Computer Weekly speaks to the man in charge of its IT Continue Reading
-
News
12 Jul 2016
IBM sets up security centre in Canberra
IBM leads the charge as large private businesses invest heavily in security resources across Australia in an attempt to close the security gap Continue Reading
-
News
08 Jul 2016
Cisco UK and Ireland CEO Phil Smith steps down after 22 years
Phil Smith announces he is stepping down from the day-to-day running of Cisco’s UK and Ireland business to take up the role of chairman Continue Reading
-
E-Zine
07 Jul 2016
CW ASEAN: July 2016
Lessons from the Philippine government hack: In this issue we ask why a hack on the Philippine Commission on the Elections (Comelec) was allowed to happen and what organisations in Southeast Asia can learn from this breach of security. Retailers in the region are concerned – read how the theft of customer data is their biggest worry. Continue Reading
-
E-Zine
07 Jul 2016
CW ANZ: July 2016
Australia knows it has a cyber security problem, but not the scale. In this month’s CW ANZ we describe how Australia's $230m security strategy serves as a wake-up call to enterprises. We also reveal the techniques and technologies being used to protect one Australian school, as well as a more general look at the main cyber threats to orgainsations in Australia. Read the issue now. Continue Reading
-
News
29 Jun 2016
Lauri Love may be faking mental illness claims lawyer for US
Prosecution lawyer Peter Caldwell questions whether activist Lauri Love is exaggerating mental health problems to avoid extradition to face hacking charges in the US Continue Reading
-
News
07 Jun 2016
Internet traffic to triple by 2020, says Cisco
The latest edition of Cisco’s Visual Networking Index predicts a near tripling of internet traffic during the coming years as more than a billion people come online Continue Reading
-
News
01 Jun 2016
MPs’ private emails are routinely accessed by GCHQ
Computer Weekly investigation reveals the extent of interception of MPs’ and peers’ email communications and data Continue Reading
-
Feature
01 Jun 2016
My first IoT project: A guide for businesses
We’ve all had a good giggle about having our fridges hacked – but now it’s time to get real. What are the first steps enterprises should take when implementing their first internet of things project? Continue Reading
-
E-Zine
19 Apr 2016
The hunters who prey on cyber criminals
In this week’s Computer Weekly, we talk to the hunters – a new breed of security expert that proactively hunts down cyber attackers before they can strike. We visit Silicon Valley to meet some of the up-and-coming startups in data analytics and business intelligence. And we hear from IT leaders about the people, process and cultural aspects of managing digital transformation. Read the issue now. Continue Reading
-
News
15 Apr 2016
Israeli volunteers ready their cyber defences as Anonymous affiliates attack
Every April, Israel braces itself for an onslaught from pro-Palestinian hackers, but the occupants of a small conference room in Tel Aviv stand in their way Continue Reading
-
News
11 Apr 2016
Activist Lauri Love faces order to disclose encryption keys
The UK’s National Crime Agency takes an unusual legal step to force a former university student accused of hacking to disclose encryption keys Continue Reading
-
Opinion
07 Mar 2016
The problem with passwords: how to make it easier for employees to stay secure
An organisation’s IT security can be compromised if staff do not follow a strict policy of using strong passwords to access internal systems Continue Reading
-
E-Zine
23 Feb 2016
Surviving broadband failure
In this week’s Computer Weekly, after the recent BT broadband outage, we examine the options to keep your communications in place in the event of a failure, to ensure business continuity. We look at the prospects for the OpenStack open source cloud platform in the enterprise. And we see how Ireland is making progress on delivering a digital health service. Read the issue now. Continue Reading
-
News
29 Jan 2016
HSBC online services hit by DDoS attack
HSBC was hit by a distributed denial of service (DDoS) attack, which targeted its online personal banking services. Continue Reading
-
News
27 Jan 2016
Average DDoS attacks fatal to most businesses, report reveals
Criminal activity is top motivation for DDoS attacks as average attacks become strong enough to down most businesses, Arbor Networks report reveals Continue Reading
-
Feature
05 Jan 2016
Interview: James Bamford on surveillance, Snowden and technology companies
Investigative journalist and documentary maker James Bamford was among the first to uncover the secrets of the US National Security Agency and its global surveillance Continue Reading
-
News
24 Dec 2015
Top 10 IT security stories of 2015
Computer Weekly looks back at the most significant stories on IT security in the past 12 months Continue Reading
-
Guide
07 Dec 2015
Essential guide to data breaches, the dark web and the hidden data economy
In this guide, we look at the aftermath of a data breach - what do cyber criminals use that stolen data for, and what can companies do to avoid becoming a victim? Continue Reading
-
News
02 Nov 2015
Hewlett Packard Enterprise: think of us as a startup
As Hewlett Packard Enterprise and HP Inc finally part ways, UK managing director Andy Isherwood shares some insight on what the future holds for the newly minted enterprise business Continue Reading
-
Feature
15 Oct 2015
The true cost of a cyber security breach in Australia
The costs of cyber security breaches can quickly add up with fines, reputational damage and overhauls to network security all hitting the coffers. The case of one Australian firm shows why paying a ransom to a hacker might be tempting. Continue Reading
-
News
12 Oct 2015
Encryption is a double-edged sword, says Blue Coat
Seven more security suppliers join Blue Coat encrypted traffic management programme amid fresh warnings of attackers using encryption to hide malicious activity Continue Reading
-
Feature
09 Oct 2015
The security dangers of home networks
Most companies take reasonable steps to protect their networks from virus attacks, but one area of vulnerability that is often overlooked is infection from employees’ home networks Continue Reading
-
Feature
09 Oct 2015
How to ensure strong passwords and better authentication
Five steps to ensure stronger passwords and better authentication to reduce the threat of business data theft Continue Reading
-
Feature
25 Sep 2015
How to fully test IT networks for vulnerabilities
Making sure a company network is secure is a very important task, and one that should be scheduled regularly Continue Reading
-
News
16 Sep 2015
BT launches ethical hacking service for bankers
BT introduces a certified Crest Star ethical hacking test service for financial services customers Continue Reading
-
News
09 Sep 2015
Security pros failing to address digital certificate risks, survey shows
Even though 90% of security professionals believe a leading CA will be compromised in next two years, only 13% have existing automation to deal with that happening Continue Reading
-
News
16 Aug 2015
Mobile phone users at risk as hackers bug and track victims
An investigation by Australian TV show 60 Minutes demonstrates how hackers based thousands of miles away in Germany were able to record the calls of an Australian senator and track his movements Continue Reading
-
News
06 Jul 2015
The internet of things could save the honeybee from extinction
Gemalto’s M2M unit is developing an ambitious project with agricultural science firm Eltopia and the University of Minnesota. The objective: to save the honeybee from extinction Continue Reading
-
News
03 Jul 2015
Wi-Fi enhances guest experience and profitability for Belgian theme park
Bobbejaanland, one of the largest theme parks in Belgium, is using a Fortinet Wi-Fi network to offer visitors access on the go, and improve its management capabilities Continue Reading
-
News
29 Jun 2015
Cisco launches IoT System for enterprise and smart cities
Cisco unveils 15 products to address the growing complexity of internet of things deployments Continue Reading
-
News
26 Jun 2015
Computer Weekly European User Awards 2015 winners revealed
The winners have been announced for the Computer Weekly European User Awards 2015. See who made the top spots Continue Reading
-
Opinion
26 Jun 2015
Three things you may not know that DNS data can tell you
Big data tools can help network administrators gather new insights into security and performance from DNS data Continue Reading
-
News
23 Jun 2015
Pharmaceutical companies use BPM to cut cost of clinical trial drugs
Pharmaceutical companies have developed an IT system to secure the supply of medicines they need for clinical studies, saving hundreds of thousands on their drugs bill in the process Continue Reading
-
News
03 Jun 2015
VMware puts network virtualisation to work in McAfee environments
VMware announces an integrated system to automate distribution and enforcement of McAfee’s network security platform using its NSX network virtualisation system Continue Reading
-
News
29 May 2015
Computer Weekly European User Awards 2015 shortlist
Find out who made the Computer Weekly European User Awards 2015 shortlist Continue Reading
-
News
20 May 2015
BT Openreach turns to Crimestoppers to catch cable thieves
Openreach extends its partnership with crime-fighting charity Crimestoppers to tackle cable theft Continue Reading
-
News
18 May 2015
Wi-Fi Global Congress: Hotspot 2.0 standard addresses wireless security holes
At Wi-Fi Global Congress, Ruckus Wireless announces it will be first to market with the second release of Hotspot 2.0 Continue Reading
-
News
11 May 2015
PSNGB rebrands to drive information sharing across PSN
PSNGB, the trade association set up to promote the Public Services Network, rebrands itself as Innopsis and says its work is far from over Continue Reading
-
Feature
25 Apr 2015
Bill Binney, the ‘original’ NSA whistleblower, on Snowden, 9/11 and illegal surveillance
Always a patriot: Computer Weekly talks to Bill Binney, the senior NSA official who blew the whistle before Edward Snowden Continue Reading
-
E-Zine
20 Apr 2015
The future of Moore's Law at 50
In this week's Computer Weekly, Moore's Law – the seminal forecast by Intel founder Gordon Moore that oversees technology development – is 50 years old. We look at its modern relevance and future implications. IT chiefs discuss whether Windows is still core to their strategy. And we look back at five years of government IT. Read the issue now. Continue Reading
-
News
14 Apr 2015
Security risk potential linked to young, mobile users
A study conducted by wireless supplier Aruba Networks has identified a distinct cohort of high-risk, security-agnostic workers Continue Reading
-
News
11 Mar 2015
Why IAM is topping security investments in 2015
It is not surprising identity and access management (IAM) is set to move to the fore in 2015 Continue Reading
-
News
09 Mar 2015
2015 IT priorities: SDN yet to prove itself, fear of network hacks growing
In Computer Weekly’s 2015 IT priorities study, software-defined networking is still behind management and monitoring as a networking priority Continue Reading
-
Feature
06 Mar 2015
How to secure the SDN infrastructure
As more enterprises look to deploy software-defined networking, the need for security from the ground up should not be underestimated Continue Reading
-
News
27 Feb 2015
Case study: Norwegian insurer invests in Darktrace machine-learning cyber defence
Shipping insurance company DNK hopes to inspire the rest of the shipping industry to adopt Darktrace’s cyber defence system Continue Reading
-
News
06 Feb 2015
Symantec continues cloud investment in spite of poor Q3 results
Symantec has reported third quarter 2015 revenue of $1.64bn, a drop of 4% compared with $1.70bn over the same period in 2014 Continue Reading
-
E-Zine
05 Jan 2015
CW Europe – January 2015 Edition
As we start another new year we look back at what technology has been playing a vital role in keeping Europe safe. Headlines are regularly filled with threats about cyber wars and attacks which, although are important to bring to light, can sometimes overshadow the role technology plays in keeping us safe. Continue Reading
-
News
23 Dec 2014
What might North Korea v US cyberwarfare over Sony mean for other corporates?
North Korea behind Sony attack and US counter-penetration -- what now, asks SearchCIO's Francesca Sales. Continue Reading
-
News
18 Dec 2014
CIO interview: Mercedes AMG Petronas IT director on the need for speed in IT
When Matt Harris became IT director for F1 team Mercedes AMG Petronas in 2009, IT costs needed to be slashed Continue Reading
-
News
17 Dec 2014
Cabinet Office begins procurement for next stage of Gov.uk Verify
The Cabinet Office has submitted a tender notice for a £150m three-year framework for the provision of identity assurance services Continue Reading
-
News
28 Nov 2014
CGI secures communications between pilots and air traffic control
Satellite communications firm Inmarsat has outsourced the provision of security IT and services to CGI Continue Reading
-
News
25 Nov 2014
National Trust for Scotland overcomes legacy network challenge
The National Trust for Scotland has replaced a historical network infrastructure with a core service from Brocade Continue Reading
-
News
11 Nov 2014
Network firewalls as relevant to data security as ever, says industry pioneer Gil Shwed
Network firewalls are as relevant to data security today as they were 20 years ago, says industry pioneer Gil Shwed Continue Reading
-
E-Zine
27 Oct 2014
Securing critical industrial systems
In this week’s Computer Weekly, we examine the security threats to the industrial control systems that power the UK’s critical national infrastructure, and ask what can be done to better protect them. We look at the key considerations when choosing an infrastructure as a service supplier. And we compare six of the top hybrid flash array products from the leading storage hardware providers. Read the issue now. Continue Reading
-
News
08 Oct 2014
Malware being used to steal cash from ATMs
Criminals are using malware to steal cash from ATMs without debit and credit cards Continue Reading
-
E-Zine
03 Oct 2014
CW Europe - October 2014 Edition
BYOD policies: What’s allowed and what’s banned? As IT departments still try to come to terms with the notion of BYOD, CW Europe takes a look at what policies are being implemented to keep security under control. Continue Reading
-
News
15 Sep 2014
Salesforce issues advice on avoiding Dyreza attack
Salesforce has issued a set of guidelines on tightening security after a number of its customers were targeted by the Dyreza email virus Continue Reading
-
News
21 Aug 2014
Load balancing supports Kent County Council's VDI project
Kent County Council picks Kemp Technologies load balancers to support a deployment of VMware Horizon View and Workspace across its estate Continue Reading