• NEWS

    NEWS

    THE LATEST NEWS, DEVELOPMENTS AND ANNOUNCEMENTS AS THEY HAPPEN

    more
  • EVENTS

    EVENTS

    CONFERENCES, TRADE SHOWS, LIVE WEBCASTS, NEW LAUNCHES, SEMINARS AND TRAINING EVENTS

    more
  • COMPANIES

    COMPANIES

    PARTNERS, SOLUTIONS & SERVICE PROVIDERS, SUPPLIERS AND INDUSTRY ORGANIZATIONS

    more
  • RESOURCES

    RESOURCES

    WHITEPAPERS, MARKET REPORTS, RESEARCH, ON-DEMAND WEBINARS, VIDEOS AND INFOGRAPHICS

    more

NEWS

   

    home.aspx
  • Google cashes in on AI neural network startup

    Google has acquired an AI image processing, neural network startup called AIMatter based in Belarus as the tech industry converges on the top trend. AIMatter is known for an app called Fabby that is b...


    READ MORE
    http://www.cbronline.com/news/internet-of-things/cognitive-computing/google-cashes-ai-neural-network-startup/4655
  • Microsoft Launches Cloud Service for Event-Based Applications

    Microsoft took the wraps off a new service called Azure Event Grid that enables developers to build event-based and serverless applications on the Redmond, Wash. tech titan's cloud. Enterprises ar...


    READ MORE
    http://www.eweek.com/cloud/microsoft-launches-cloud-service-for-event-based-applications4660
  • Hackers hit Holyrood with Westminster-style brute-force attack

    Cyber attackers have reportedly tried to steal the email credentials of Scottish MPs in a brute-force attack just over seven weeks after a similar 12-hour assault aimed at Westminster MPs. In both cas...


    READ MORE
    http://www.computerweekly.com/news/450424525/Hackers-hit-Holyrood-with-Westminster-style-brute-force-attack4651
  • Regulation and impact of cyber attacks driving security spending

    Awareness of the impact of cyber attacks on business and regulation are expected to be the top drivers of continued and increased spending on cyber security, according to research firm Gartner. Securi...


    READ MORE
    http://www.computerweekly.com/news/450424541/Regulation-and-impact-of-cyber-attacks-driving-security-spending4656
  • Skilled bad actors use new pulse wave DDoS attacks to hit multiple targets

    In a new type of DDoS attack, skilled bad actors use pulse wave DDoS assaults to exploit weaknesses in appliance-first hybrid mitigation solutions and pin down multiple targets. In a new report, Incap...


    READ MORE
    http://www.csoonline.com/article/3216548/security/skilled-bad-actors-using-new-pulse-wave-ddos-attacks-to-pin-down-multiple-targets.html4659
  • Why you should appreciate GDPR for the cybersecurity opportunity it is

    Gordon Morrison, director of government relations at McAfee, looks at how GDPR is a once in a lifetime opportunity to overhaul cyber processes. With new stipulations around data protection and reporti...


    READ MORE
    http://www.cbronline.com/news/cybersecurity/business/gdpr-cybersecurity-opportunity/4654
  • Microsoft Gives Windows Insiders Early Access to Eye Control Feature

    Little more than a day after announcing it was adding Eye Control to Windows 10, Microsoft is letting Windows Insiders take the feature for a spin. Eye Control is an accessibility-enhancing eye techno...


    READ MORE
    http://www.eweek.com/enterprise-apps/microsoft-gives-windows-insiders-early-access-to-eye-control-feature4645
  • Artificial Intelligence Taking a Bigger Role in Antimalware Technology

    Artificial intelligence is taking on a bigger role in antimalware products. But it's not foolproof and its clear cyber-criminals will soon use AI to make their malware stealthier. Even as artifici...


    READ MORE
    http://www.eweek.com/security/artificial-intelligence-taking-a-bigger-role-in-antimalware-technology4641
  • Primary Data Gets New VC Funding, Launches DataSphere 2.0

    The company said it would use its $40 million in VC to support sales growth alongside the 2.0 release of its DataSphere software platform, which includes machine learning capabilities. Data automation...


    READ MORE
    http://www.eweek.com/big-data-and-analytics/primary-data-gets-new-vc-funding-launches-datasphere-2.04642

EVENTS

Conferences

Gartner Security & Risk Management Summit 2017

GARTNER SECURITY & RISK MANAGEMENT SUMMIT 2017

August 29-30, 2017
Gartner Security & Risk Management Summit 2017 is a premier annual gathering of security, risk management and BCM leaders. It provides the insight you need to guide your organization into a secure digital business future. This year’s agenda addresses the latest threats, flexible new securi...

VMworld 2017 US

VMWORLD 2017 US

August 27-31, 2017
VMworld is VMware’s premier thought leadership and education destination for cloud infrastructure and digital workspace technology professionals. Join us for five days of innovation and learn new skills, hear expert insights and gain the tools to enable business success. At VMworld, you’...

Open Source Summit

OPEN SOURCE SUMMIT

September 11-14, 2017
LinuxCon, ContainerCon, CloudOpen and the new Open Community Conference combine under one umbrella name in 2017 - the Open Source Summit. At the Open Source Summit, you will collaborate, share information and learn across a wide variety of topics, with 2,000 technologists and community members.

VMworld 2017 Europe

VMWORLD 2017 EUROPE

September 11-14, 2017
VMworld is VMware’s premier thought leadership and education destination for cloud infrastructure and digital workspace technology professionals. Join us for four days of innovation and learn new skills, hear expert insights and gain the tools to enable business success. At VMworld, you’...

CMSWire`s Digital Experience (DX) Summit 2016

CMSWIRE`S DIGITAL EXPERIENCE (DX) SUMMIT 2016

November 14-16, 2016
Sponsored
CMSWire’s Digital Customer Experience (DX) Summit 2016 conference brings together the world’s foremost digital customer experience (DX) and marketing technology (MarTech) leaders and practitioners who are defining the next generation of digital experiences and creating the organizations and teams th...

NDC Sydney 2017

NDC SYDNEY 2017

August 14-18, 2017
NDC Sydney 2017 is set to happen 14-18 August at Hilton Sydney. The conference will have the same format as its European sisters NDC Oslo and NDC London with 2 days of workshops and 3 days of conference sessions. Testing is a key part of development lifecycle, from checking your functional requireme...

Agile2017

AGILE2017

August 07-11, 2017
We invite you to join attendees from over 40 countries at Agile2017. Explore over 250 Agile Sessions, plus insightful Keynotes and a host of social and networking events during this exciting week of Agile learning, collaborating, and connecting. Agile Developers, Executives, Teams, Managers, Coaches...

3rd Global Summit and Expo on Multimedia & Artificial Intelligence

3RD GLOBAL SUMMIT AND EXPO ON MULTIMEDIA & ARTIFICIAL INTELLIGENCE

July 20-21, 2017
Conferenceseries LLC ‘s 3rd Global Summit and Expo on Multimedia & Artificial Intelligence is a leading conference for international community of academic experts, scholars and business people in the field of Multimedia Technologies.

 

Webinars

AUG 22, 2017
UNSUPERVISED LEARNING TO UNCOVER ADVANCED CYBER ATTACKS
This case study is framed in a multinational company with 300k+ employees, present in 100+ countries, that is adding one extra layer of security based on big data analytics capabilities, in order to provide net-new value to their ongoing SOC-related investments.
AUG 22, 2017
HOW TO KNOW IF YOUR CLOUD DECISION IS RIGHT FOR YOUR SMB
Everyone knows the advantages of the cloud, right? I mean, it seems the default answer to every technology discussion is to “put it in the cloud.” The answer is not that simple. Choosing the “right” cloud is critical to successfully meeting specific requirements. Wh...
AUG 23, 2017
AN INSIDE LOOK AT RANSOMWARE-AS-A-SERVICE
Ransomware has become one of the most visible and damaging threats internet users face today. Thanks to ransomware as a service (RaaS), anyone with ill intent and access to the dark web can build and launch an attack. Join senior security expert John Shier as he goes behind the scenes of o...
AUG 24, 2017
SECURELY IMPLEMENTING NETWORK PROTOCOLS: DETECTING AND PREVENTING LOGICAL FLAWS
Properly implementing network protocols is essential in securing any network-accessible device. Although there has been a substantial amount of work on detecting and preventing common programming mistakes such as buffer overflows and use-after-free's, less attention has been given to t...
SEP 06, 2017
LEVERAGING NFV TO FUTURE-PROOF FOR NETWORK DENSITY
Coping with network density has traditionally involved the addition of small cells or Wi-Fi in order to offload traffic from the macrocell. However, the leveraging of spectrum and network resources within a dense network today means operators must also look at the interrelation and co-depe...
SEP 06, 2017
USING VROUTERS TO AUTOMATE MANAGED ENTERPRISE SERVICES
Virtual routers, or vRouters,-the software-only version of router functions that run on commercial servers-have arrived and service providers are evaluating, testing and beginning to deploy them in new ways in live networks. vRouters have been used for many years for the control plane func...
HELICAL PILES: HISTORY, DESIGN AND APPLICATIONS
Sponsored
This live webinar is designed for architects, engineers, contractors, construction professionals, presidents, vice presidents, project managers, developers, principals, planners and government officials.
3 COST-SAVING STRATEGIES FOR SQL DEPLOYMENTS THAT YOU DIDN'T KNOW ABOUT
Join Michael McCracken, HOSTING Director of Professional services and Dave Bermingham, Microsoft cloud and Data Center MVP, to examine the TCO of high availability and disaster recovery protection for SQL Server deployments with surprising results. They will cover:How to save thousands of ...
DUDE, WHERE'S MY DATA? - INSIDE THE INTEL SECURITY DATA EXFILTRATION STUDY
It's an infosecurity department's worst nightmare. There's been a breach and information is missing. After determining what's been compromised, you need to discover how the data was accessed and exfiltrated from your enterprise. Threats vary from system to system and include malicious insi...
DON’T GET CAUGHT WITH AN OUT OF SUPPORT MS SQL SERVER
This means that if you are still running SQL Server 2005 after April 12, 2016, you will no longer receive security updates. Now is the time to upgrade to SQL Server 2014 and Azure SQL Database to achieve breakthrough performance, maintain security and compliance, and optimize your data pla...
WHAT VULNERABILITY ASSESSMENT TOOLS MISS
Open source software and code has become common place in application development, as have the use of vulnerability assessment tools. After all, no one wants to be the victim of the next Heartbleed, Poodle or Logjam. But vulnerability assessment tools, while helpful, have blind spots. How c...
AGILE TEST AUTOMATION – TRUTH, OXYMORON OR LIE?
It can be confusing for everyone in an agile team to understand when or what to test, when there isn’t a test phase or any formal documented requirements. Whatever your agile methodology, projects require a change in the way QA and development work together. The use of technology and...
DEFUSE THE USER ACCEPTANCE TESTING TICKING TIME BOMB
Software applications built, purchased or consumed in the cloud all have one thing in common, they need to be tested before going live and had at least one round of User Acceptance Testing. That means a combination of business analysts and subject matter experts must put their day-to-day w...

RESOURCES

WR believes that huddle rooms should be an integral part of every organization’s meeting room and collaboration strategy for several reasons including:
The addi...

Outsourcing is no longer a simple matter of shifting labour from expensive locations to less costly ones. Over the years outsourcing community and the objectives that companies want to achieve from ou...

In every industry today, businesses feel a fierce urgency to become customer-centric. They want to know what they can do to preserve and expand existing customer relationships and attract the best new...

If your company is like most, over the last few years you have seen your top teams focused on leveraging social, mobile, analytics, and cloud (SMAC) to transform your enterprise into a digital busines...

The overall health of network operations, applications, management and security functions all depend on the core foundational elements: server hardware, server operating systems and virtualization to ...

Enterprise organizations around the globe are constantly searching for innovative technologies to enable them to reduce operational cost, increase revenue, and comply with regulations. Each improvemen...

pCell is a revolutionary new approach to wireless, dramatically increasing the spectral efficiency of LTE and Wi-Fi systems, while remaining compatible with standard LTE and Wi-Fi devices. This White ...

Big data analytics requires skilled business analysts and data scientists to be successful, but those gifted professionals also need to be equipped with the proper tools of the trade. And the right to...

In this resource discover how you can explore and analyze your big data sets with a holistic solution that yields a significant ROI. Read on to learn how leading North American financial institution D...