
New ISACA Guide Helps Enterprises Design and Implement Monitoring Processes over Key Controls
5 October 2010 by Marc Jacob
“Yes – we can secure the cloud” claims new test report
4 October 2010 by Broadband Testing and Spirent Communications
All-over-IP 2010: tell us what you think!
27 September 2010 by Marc Jacob
Mimecast: IT Managers’ Migration Fears are Slowing Adoption of Exchange 2010
27 September 2010 by Mimecast
InfoSecurity Russia-2010: “Living in the Clouds. How Modern Infrastructure Solutions Can Change Life of Organizations” in Report by Vitali Fridland, CEO, Fujitsu Technology Solutions, Russia
24 September 2010 by Marc Jacob
InfoSecurity Russia-2010: “How to Achieve Disaster-Tolerant Protection of Business” in Report by Viktor Babkov, CTO, Business Continuity International
24 September 2010 by
Veracode State of Software Security Report Shows Suppliers of Cloud/Web-Based Applications Face Greatest Scrutiny by CXOs
22 September 2010 by Veracode
Imperva: Nosy NHS employee accesses patient records 336 times – when will the NHS learn
21 September 2010 by Imperva
SpamTitan Technologies: Phishers still favour spam over social networking sites
21 September 2010 by SpamTitan
The Bunker ranks highly in Sunday Times Microsoft Tech Track 100
21 September 2010 by
Tuffin Technologies: One in five college and university students have hacked
21 September 2010 by
2010 “Top Cyber Security Risks Report” Highlights Latest Data on Most Significant Security Risks Facing Enterprises
16 September 2010 by Qualys, SANS Institute et TippingPoint
Survey says that smart IT is the best way to motivate workers
15 September 2010 by 360°IT
Imperva: Survey Identifies Top Data Security Technologies to Stem Data Breaches
15 September 2010 by Imperva
Blocking Anonymous Proxies still a Headache for IT Managers and pose Significant Security and Safety Risks
13 September 2010 by Bloxx
Fortify Software and Mainstay Partners Survey Security Executives to Find the Real ROI of Software Security
13 September 2010 by Fortify Software
EU Agency identifies incentives & challenges for cyber security information sharing in Europe
10 September 2010 by ENISA
Panda Security: second International Barometer of Security in SMBs
9 September 2010 by Panda
GrIDsure: Offices deserted as nearly half of UK employees work remotely over the summer
8 September 2010 by GrIDsure
Wireless car hacking a direct result of poor security at vehicle software design stage says Fortify Software
6 September 2010 by Fortify Software
Tufin Techologies “Hacking Habits” survey Cites misconfigured networks as The Main cause of breaches
31 August 2010 by Reuven Harrison CTO of Tufin Technologies
BridgeHead Software Reveals: ‘Why Disaster Recovery Is Different In Healthcare’
25 August 2010 by Marc Jacob
Fortify: DEF CON survey reveals vast scale of cloud hacking - and the need to bolster security to counter the problem
24 August 2010 by Fortify Software
Imperva says employee survey highlights dangers of insider threat
24 August 2010 by
Bloxx Web Filtering listed as Emerging Star in Info-Tech Research Group’s Vendor Report
19 August 2010 by Marc Jacob
Security market in Russia keeps growing in spite of the crisis
18 August 2010 by Groteck Business Media
Gartner Says Security Software Market is Poised for 11 Per Cent Growth in 2010
16 August 2010 by Gartner
Russian Security Market: Outcomes for 2009 and Forecasts for 2010
10 August 2010 by A.V. Vlasov, Business Development Executive, Groteck Business Media
Your podcast HereNew, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr
All new podcasts