Filter by

ESG-Bericht 2021: Technologie und nachhaltigkeit

Der Aufbau einer nachhaltigen technologischen Infrastruktur ist notwendig, um die globale Erwärmung und die schlimmsten Auswirkungen des Klimawandels abzumildern. Pure Storage ist fĂĽhrend bei der Entwicklung und Herstellung von Produkten und...

The 2022 Ransomware Survival Guide

Why is ransomware still around?Ransomware has persisted because of four primary drivers: Ransom payments are easier to collect than other types of fraud, thanks toBitcoin and other digital currencies.Attackers have...

Cloud Account Compromise and Takeover

Cloud account compromise is the act of maliciously gaining control over a legitimate user’s cloud-based email or collaboration service account—giving the attacker wide-ranging access to data, contacts, calendar entries, email...

The Business Email Compromise (BEC) Handbook

More than 350 people in Arizona received emails with similar instructions—messages that appeared to come from a vendor or another familiar business associate. And the senders? They were cyber criminals...

OVH Cloud Virtual Brewtanix

Join OVHcloud & Nutanix in a Virtual Brewtanix! What is Brewtanix? The Virtual Brewtanix is aimed at giving you the opportunity to network with Nutanix and OVH Cloud in an informal online setting to learn about...

Are you slave or master to your cloud?

Please join our panel of cloud industry luminaries to hear: What are the latest cloud trends and how can you future proof your decision makingWhy is digital sovereignty frightening governments...