Security vendor Gemalto to acquire SafeNet

IDG Reporter by IDG Reporter - August 10th, 2014

Gemalto plans to acquire SafeNet for $890 million in a deal that would combine a big vendor of portable secure elements such as payment cards with a provider of enterprise data protection technology. […]

SafeNet: Security fears preventing data centre and Cloud benefits

James Dartnell by James Dartnell - February 17th, 2014

Security concerns are preventing businesses from unlocking the potential benefits of data centre consolidation and cloud services, according to new research from SafeNet.

SafeNet to exhibit world’s first Crypto Hypervisor

James Dartnell by James Dartnell - October 13th, 2013

Safenet claims to have invented the world’s first Crypto Hypervisor, and it will unveil the technology at next week’s GITEX trade show as part of its “secure breach” strategy.

GITEX Preview: SafeNet

Joe Lipscombe by Joe Lipscombe - August 30th, 2012

1. What are your company’s key products and services? SafeNet is the largest company in the world exclusively focused on the security and protection of high value information, intellectual property and digital identity. […]

SafeNet acquires Cryptocard

Ben Rossi by Ben Rossi - March 13th, 2012

SafeNet has acquired Cryptocard, a privately held leader of cloud based authentication solutions, in a move to broaden its authentication and cloud services. The acquisition, of which the fee was not disclosed, enhances […]

Hacker headspace

James Dartnell by James Dartnell - August 19th, 2014

With cybercrime an ever-present danger, hackers around the world attack user data for financial and political gain. But they are not all bad. CNME takes a look at the mindset of hackers good and evil, and how they constantly ask questions of governments and top companies.

Virtual lock down

Annie Bricker by Annie Bricker - May 15th, 2014

Virtualisation has made the data centre a more flexible and agile place. However, the trade-off in this software-defined shift is a measure of complexity when it comes to protecting our data. Enterprises must reconsider their protection strategy to reflect the new, virtualised world.

The death of Internet privacy

Annie Bricker by Annie Bricker - March 26th, 2014

In the age of constant connection, internet users are sharing more and more sensitive information online. As hackers become more organised and the amount of data stored in the cloud increases, the potential for leaks of sensitive data becomes magnified.

European Parliament cuts Wi-Fi after French researcher hacks email accounts

John E Dunn by John E Dunn - December 2nd, 2013

The European Parliament has cut access to its public Wi-Fi network after detecting a man-in-the-middle attack on a number of email accounts apparently carried out by a white hat researcher out to expose poor security at the institution.

Security-as-a-Service: IT’s Dark Knight?

Joe Lipscombe by Joe Lipscombe - August 13th, 2013

As hackers and attackers wreak havoc on the industry, businesses have been looking for a watchful protector to secure their assets. Is security-as-a-service the IT industry’s Dark Knight?

Oracle and Salesforce.com’s love-fest: The ripple effects

Chris Kanaracus by Chris Kanaracus - July 25th, 2013

While certain recent announcements weren’t as “startling” as Oracle CEO Larry Ellison had promised they would be, its deal with Salesforce.com definitely lived up to the hype and could have some lasting ramifications.

Ticking time bomb

Tom Paye by Tom Paye - June 11th, 2013

The last year has shown more than ever how careful businesses need to be with their data. However, recent reports suggest that only a fraction of Middle Eastern enterprises have data loss prevention […]

Target located

Joe Lipscombe by Joe Lipscombe - May 22nd, 2013

In 1971, John Draper used a whistle, found in a cereal box, to reproduce a 2,600 Hz tone able to allow phreaks to make free calls – wire fraud was born. This was […]

The security guide to BYOD

Ben Rossi by Ben Rossi - April 9th, 2013

There’s no use in trying to resist it – BYOD is here to stay. To help in the transition, CNME rounds up tips from the security industry on how to cope with the […]

Eye of the storm

Joe Lipscombe by Joe Lipscombe - March 5th, 2013

Experts recently pointed towards security as the main obstacle for adoption of all cloud types and claimed that cloud security will be the main disruptive technology for 2013. But the Middle East has […]

Losing the battle

Joe Lipscombe by Joe Lipscombe - January 22nd, 2013

Security shot up the priority list of not just CIOs but also higher management in 2012 as the world witnessed the effects of countless breaches on top organisations. As a fresh year presents […]

Keeping secure? Virtually impossible

Joe Lipscombe by Joe Lipscombe - December 18th, 2012

The last 12 months has seen an incredible transformation from traditional IT towards a new, digitalised world which has begun to redefine the industry entirely. One of the key trends was the virtualisation […]

Security digital identities

Contributor by Contributor - November 4th, 2012

In today’s digital world, the identity of users is defined by their digital credentials. The ability to demonstrate their identity, or authenticate, should be a simple and straightforward action – but surprisingly, it’s […]

Clouded with uncertainty

Ben Rossi by Ben Rossi - September 11th, 2012

The migration of enterprise applications to cloud infrastructure is becoming more and more of an inevitability. But whilst private cloud and hybrid implementations in the Middle East are picking up, views towards the […]

A new era

Ben Rossi by Ben Rossi - July 4th, 2012

With the advent of the BYOD phenomenon, the amount of threats businesses face have multiplied on an unprecedented scale. Ben Rossi looks at how these trends have rapidly changed the enterprise security landscape […]

Encryption made easier with new key management tools

CNME Staff by CNME Staff - September 10th, 2009

In response to dramatic and widely publicized losses of data over the last few years, IT execs are moving to deploy encryption in every corner of the enterprise. While encryption does reduce the […]

I(TS)2 designated as a qualified security assessor for PCI audits certification

CNME Staff by CNME Staff - March 16th, 2009

IT Security Training & Solutions – I(TS)2, the Middle East’s premier provider of integrated Security Education & Certification Curriculum, Security Solutions, Security Consultancy and Managed Security Services, today announced that it has been […]

Managing software assets

CNME Staff by CNME Staff - February 11th, 2009

The current climate of company mergers and downsizing is putting CIOs under pressure to keep the lid on software costs which now account for nearly a third of the average IT budget. Add […]

  • Hands on with iPad Air 2 and iPad mini 3

    What’s rectangular, gold, and 18 percent thinner than a No. 2 pencil? The iPad Air 2, which Apple unveiled Thursday. Sporting subtle refinements like a Touch ID fingerprint sensor and a beefed-up iSight […]

  • Preview: Windows Server 10

    No major changes compared to Windows Server 2012 R2, but some very good incremental ones. With this just a very early version, here are some changes you might want to consider as you decide when to start looking at the release.

  • Review: Porsche Design Blackberry P’9883

    Although over-priced, the smartphone packs impressive features to meet the demands of the luxury user.

Copyright 2014 Computer News Middle East. All rights reserved. Product of CPI Media Group. For more information e-mail us at webmaster@cpimediagroup.com. Privacy Policy
SUBSCRIBE TO OUR NEWSLETTER * E-mail * First name: * Last name:
* Job title: * Industry sector: * Country:
x