searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • (IN)SECURE Magazine

Fujitsu

Get our top stories in your inbox

FiberLight selects Fujitsu 1FINITY platform and Virtuora to expand its high-bandwidth fiber network

July 15, 2020

Fujitsu Network Communications announced that fiber infrastructure provider FiberLight has selected the Fujitsu 1FINITY platform and Virtuora Network Control Solution to …

Fujitsu releases seven models of Notebook LIFEBOOK to support initiatives on remote work

June 3, 2020

Fujitsu announced the launch of seven models of Notebook LIFEBOOK with Windows 10 and the latest 10th generation Intel Core Processor. Sales of the new models will be rolled …

Fujitsu announced as the latest OpenChain 2.0 Conformant company

December 3, 2019

The OpenChain Project is delighted to announce that Fujitsu, a Platinum Member of the OpenChain Project, is the latest OpenChain 2.0 Conformant company. This activity is a …

Easy NX Connect for Egnyte enables fast and secure file sharing

September 16, 2019

Fujitsu Computer Products of America, the established leader in document imaging, announced a new integration with the FUJITSU fi-7300NX document scanner and Egnyte. Easy NX …

SSH and Fujitsu partner to offer privileged access as a service

October 23, 2018

SSH and Fujitsu have signed a partnership agreement that enables Fujitsu to offer SSH’s PrivX Cloud Access Gateway to complement its Identity-as-a-Service (IDaaS) offering. …

Cloud service adoption creates new data center demands

February 7, 2018

Both consumer and business applications are contributing to the growing dominance of cloud services over the Internet, according to the Cisco Global Cloud Index (2016-2021). …

Good privacy is good for business, so pay attention

January 26, 2018

Data privacy concerns are causing significant sales cycle delays for up to 65 percent of businesses worldwide, according to findings in the new Cisco 2018 Privacy Maturity …

Most businesses to invest in artificial intelligence by 2020

November 21, 2017

Eighty-five per cent of senior executives plan to invest in artificial intelligence (AI) and the Internet of Things (IoT) by 2020, according to a new survey of UK digital …

Digital skills gap: The biggest hindrance to addressing cybersecurity?

October 18, 2017

Although businesses recognize the importance of digital transformation, organizations worldwide are struggling to balance the elements needed to deliver on digital. Of 1,625 …

New infosec products of the week​: September 15, 2017

September 15, 2017

FinalCode 5.3 extends the types of applications traditional IRM can support FinalCode updated its persistent, file-centric information rights management (IRM) solution. …

Fostering a safe place for businesses to work in

June 22, 2017

It’s no secret that in the past few years, business leaders have begun to realise the potential of digital transformation to give their organisation a competitive edge. …

New infosec products of the week​: November 25, 2016

November 25, 2016

Anomali STAXX: Easy way to subscribe to any STIX/TAXII feed Anomali, provider of threat intelligence platforms, today announced the availability of Anomali STAXX, a free …

architecture

Why enterprises need rugged devices with integrated endpoint management systems

  • Five factors driving investment in IDV
  • 2021 will be the year of hybrid working: How can CTOs keep staff secure and productive?
Whitepaper – EDR to secure mobile devices: Coverage, limits & recommendations

What's new

hand

Attackers disrupting COVID-19 efforts and critical supply chains

identity

Five factors driving investment in IDV

architecture

Why enterprises need rugged devices with integrated endpoint management systems

businessman

C-level executives driving the adoption of MACH across their organizations

Don't miss

architecture

Why enterprises need rugged devices with integrated endpoint management systems

identity

Five factors driving investment in IDV

tracking

CNAME-based tracking increasingly used to bypass browsers’ anti-tracking defenses

2021 will be the year of hybrid working: How can CTOs keep staff secure and productive?

template

Third-party risk management programs still largely a checkbox exercise

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • Twitter

In case you’ve missed it

  • Chief Legal Officers face mounting compliance, privacy and cybersecurity obligations
  • How do I select a network monitoring solution for my business?
  • Tips for boosting the “Sec” part of DevSecOps
  • How do I select a DRM solution for my business?

(IN)SECURE Magazine ISSUE 67 (November 2020)

  • Hardware security: Emerging attacks and protection mechanisms
  • Justifying your 2021 cybersecurity budget
  • Cooking up secure code: A foolproof recipe for open source
  • Mapping the motives of insider threats
Read online
© Copyright 1998-2021 by Help Net Security
Read our privacy policy | About us | Advertise