Virtustream first with Intel TXT

IaaS provider says it is the first to implement the chipmaker’s Trusted Execution Technology in a cloud management platform

Read More
Gartner looks into RaaS

Recovery as a Service is seen as a category of its own in the latest Gartner research, and one of the contenders it picks, Bluelock, talks about it

Read More
The `cloudy car’ market will be huge

Market research report suggests it could be worth over $98 billion by 2018, and the potential of new applications is limitless, though some could be distractingly bad for drivers.

Read More
Tenable joins AWS

Tenable’s widely used Nessus vulnerability scanner is now available as part of Amazon’s AWS Marketplace

Read More
Amazon pumps support into the AWS partners

Remaining the `big gorilla’ in the world of providing cloud infrastructure means more than...

Read More
Securing clouds, and more, by policy

CloudSigma adds policy-based security to its IaaS offering to provide faster, cheaper and more...

Read More
HyTrust buys HighCloud for maximum strength security

By combining its security admin and control tools with HighCloud’s encryption and key...

Read More
Thales gives Microsoft Azure BYOK

Bring Your Own Key using Thales technology is a security approach that Microsoft is now using to...

Read More
Applying analytics to cloud security

Total Defense says it has put some serious big data analytics steroids into its latest...

Read More
Security against the unknown now comes as a service

Lastine, a three year old security specialist with a longer history in identifying the dangerous...

Read More
Fujitsu Forum – A humble lightbulb shows the good and bad of IoT

Fujitsu CTO, Dr Joseph Reger, used a single, IP address-publishing lightbulb to extrapolate out the...

Read More
Sophos delivers security in the cloud

Possibly one of the ultimate services a small business requires is security, and getting it...

Read More
Be careful with apps using NFC

Anyone developing new applications that use the new contactless debit/credit cards and Near Field...

Read More
Laying policy on BYOD security

The partnership between Forescout and SAP aims to make all user devices subject to policy...

Read More
Carrenza gives Oracle users a DRaaS option

Many Oracle users have a high-resilience environment but no escape route if disaster strikes, so...

Read More

Videos

Meredith Kendrick, Product Line Manager at AFL, explains the company’s DENALI platform – with a particular focus on how it supports increasing fibre density demands in rapidly evolving, GPU-intensive fibre...
Alexander Goodall, Founder & CEO at Xela Energy, talks through the company’s rebrand from Clean Energy Capital to Xela Energy, an Enterprise Independent Power Producer (EIPP) and a leading UK provider of...
Tom Artinian, CEO and President of TiniFiber, shares the company’s vision and mission which centres on delivering ultra-rugged, high-speed fiber cabling, connectivity, tools, and solutions that enable...
Amber Walsh, Senior Analyst at Bluefield Research, discusses the findings of the company’s new report, U.S. Water for Data Centers: Market Trends, Opportunities, and Forecasts, 2025–2030, which reveals...

Expert Opinions

By Hugh McEvoy, Senior Director of Strategy & Business Development at Trimble.
By François Haykal, Senior Project Consultant at BCS, the specialist services provider to the digital infrastructure industry.
In the rush to embrace cloud-first strategies, data security has become dangerously misunderstood, and the result is a fragmented, chaotic environment that’s starting to feel like the Wild West.