Compulsive use of the internet linked to excessive work

People may be using the internet in order to cope with the demands of excessive work, and this coping strategy is not restricted to the young. These are the findings reported at the Annual Conference of the British Psychological Society’s Division of Occupational Psychology in Brighton, by...

Read More
San Miguel Pure Foods selects IBM

San Miguel Pure Foods Company, Inc.(SMPFC), one of the country’s leading food companies, and...

Read More
2014 looks bright for SMEs

Small to medium sized organisations (SMEs) in the UK are optimistic about business prospects in...

Read More
Top seven IT industry trends In 2014

Ian Kilpatrick, chairman of VAD Wick Hill Group, looks forward to the coming year.

Read More
Queen Elizabeth Olympic Park to help London become digital world leader

Ambitious plans to transform Queen Elizabeth Olympic Park into one of the world’s leading...

Read More
SunGard announces Business Trends for 2014

SunGard Availability Services has revealed its top five predictions for 2014 as businesses look to...

Read More
Red Hat announces general availability of Red Hat Enterprise Linux OpenStack Platform 4.0

Red Hat has announced the general availability of Red Hat Enterprise Linux OpenStack Platform 4.0....

Read More
CIOs seek to maintain relevance through service-led transformations

As IT spend moves to line of business managers, and with more than half spending at least 70% of...

Read More
Orange selects iGATE

Awards iGATE a five-year contract valued at $80 million - with a possible one year extension - to...

Read More
Den gesamten Datenbestand lokal und in der Cloud verschlüsseln

Ubique Technologies verbindet Speicherdienst IntelliVault mit Security-Stick IndependenceKey

Read More
PoINT Storage Manager steigert Datensicherheit über automatisierte Replikation

Die PoINT Software & Systems GmbH hat in ihrem PoINT Storage Manager eine Replikationsfunktion...

Read More

Videos

In this interview, Aaron Watts, Chief Channel Officer at usecure, explains why people, not just technology, are now the primary target for cyberattacks. He explores how MSPs can balance automation with...
In this interview, Gal Yosef, Director of Solution Engineering at AlgoSec, discusses how AI is reshaping both cyber threats and defences, and why visibility, policy enforcement and operational discipline are...
Omer Wilson, Chief Marketing Officer of the Start Campus, explains why Start Campus and EDP have signed a strategic partnership marking their shared intention to accelerate next-generation, renewable-powered...
Phil Cullerton, VP Services EMEA at Vertiv, explains why services will define the future of the data centre. The future of the data centre is not just about who builds fastest, it is about who operates best....

Expert Opinions

By Sujatha S Iyer, Head of AI Security at Zoho Corp.
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...
By Michael Vallas, Global Technical Principal, Goldilock Secure.
By Dan Bridges, Technical Director, Dropzone AI.