ISACA releases “Configuration Management: Using COBIT 5” to help businesses manage change

Change can cause business disruptions, inefficiencies and financial losses. Proper configuration management (CM) reduces the risk of malfunctions and increases efficiency during times of IT-related change. To help enterprises implement effective CM, global IT association ISACA has released a new...

Read More
3M study reveals French concerns about shoulder surfing

Survey shows nearly half of French adults are concerned about visual data security; almost two fifths have been able to read others’ confidential information.

Read More
Study reveals “big doubts” over mobile compliance

Only 18 percent of organizations are confident that their mobile policies are compliant with corporate policy and government regulation, according to research released by Accellion, Inc., the pioneer in providing enterprise-class, secure mobile productivity solutions, and AIIM, a global non-profit...

Read More
Lieberman Software and Qualys integration

Lieberman Software Corporation and Qualys, Inc. have announced the integration between Enterprise...

Read More
Strategic partnership with Ingram Micro UK

Outsourcery plc has agreed a strategic partnership with Ingram Micro UK, a division of Ingram Micro...

Read More
Passive Vulnerability Scanner now available

Drop-in solution identifies security and compliance violations in BYOD, cloud, and Virtual...

Read More
Major vendors and ICT channels come together to address the surge in customer demand for managed services

IT Europa and Angel Business Communications today announced further details of the Managed Services...

Read More
Five steps to prepare for a DDOS attack

By Sean Leach, Vice President of Technology for Verisign.

Read More
Skills gap remains

New report from the UK Commission for Employment and Skills reveals that IT specialists are the new...

Read More
Wick Hill appointed Guidance Software distributor

Wick Hill appointed distributor for Guidance Software - a world leader in digital forensics, cyber...

Read More
Mobile mayhem?

As organizations embrace digital transformation, application quality is an increasingly important...

Read More
Internet Security Days: two days devoted to IT Security

Intensive knowledge exchange by international security specialists on today’s challenges.

Read More
Intel introduces ‘highly versatile’ datacenter processor family

Intel® Xeon® Processor E5-2600 v2 product family offers up to 45 percent greater efficiency...

Read More

Videos

Keith Sullivan, Director of Strategic Innovation at AFL, explains what meshing means in the context of data centres and why it is particularly important when it comes to GPU-intensive, AI compute workloads....
Richard Jelbert, CEO of Cyberrock, discusses how, in today’s fast-changing digital landscape, businesses of all sizes face relentless cyber threats often without the dedicated resources or in-house expertise...
Keith Sullivan, Director of Strategic Innovation at AFL, explains what meshing means in the context of data centres and why it is particularly important when it comes to GPU-intensive, AI compute workloads....
Chris Gilmour, CTO of Axians UK, explains how Axians, the ICT brand of VINCI Energies, and Nokia are deepening their strategic collaboration to drive the next phase of communications infrastructure and mobile...

Expert Opinions

By Jennifer Holmes, CEO of the London Internet Exchange (LINX).
In Houston’s industrial sector, Champion Machine Tools has long been known for precision manufacturing, fast turnaround, and the kind of craftsmanship that keeps America’s supply chains running. But as...
By Arturo Di Filippi, Offering Director, Global Large Power at Vertiv.