NATO legt Richtlinien für die Cyber-Kriegsführung vor – Warnung vor Angriffen auf kritische Infrastruktur

In einem neuen Handbuch der NATO wurde nun ein Verhaltenskodex für die Kriegsführung im Cyberspace festgehalten. In dem Dokument wird unter anderem vor Cyber-Angriffen auf kritische Infrastruktureinrichtungen wie Krankenhäuser oder AKWs gewarnt, die zwar als...

Read More
HP Converged Infrastructure enables new levels of performance and collaboration

HP has been selected by DreamWorks Animation SKG, Inc. (Nasdaq: DWA) to deliver the technology behind “The Croods,” pushing the boundaries of modern imagery for this prehistoric animated adventure that is anything but primitive.

Read More
GFI Software gründet neue unabhängige Firma mit Fokus auf innovativen Sicherheitslösungen

GFI Software plant die Ausgliederung des Security-Technologie-Geschäftsbereichs mit seiner VIPRE Familie von Antivirus-Produkten und seinen Anti-Malware-Lösungen SandBox und ThreatTrack und gründet ThreatTrack Security Inc. 

Read More
Schritt in die richtige Richtung: Neuer Referentenentwurf zur Erhöhung der Sicherheit von IT-Systemen

Dem Bundeskabinett soll demnächst ein Referentenentwurf vom Bundesinnenministerium...

Read More
ISACA issues governance and assurance guidance for Big Data

Big data can save big money. A recent McKinsey report found that value gained from data in the US...

Read More
IT services market endured a dismal end to 2012

Last year was the worst for IT services contract activity since 2002, according to research from...

Read More
Hadoop security comes under scrutiny

Dataguise has announced the results of a recent survey on the importance of securing sensitive data...

Read More
Number of data leaks in government sector continues to rise

InfoWatch Research Center has released its latest annual report on worldwide data leaks reported by...

Read More
Latest Claranet research highlights Bring Your Own Dilemma

96 per cent say mobile working benefits their organisation, but three quarters think BYOD increases...

Read More
Ovum predicts radical change for the enterprise landscape by 2020

Citrix, Google, VMware and Yammer identified as disruptive players driving this transformation.

Read More
Huge savings from mobile working could cost businesses a fortune if they ignore off-site security

A report on remote and home working released today has found that British businesses could be...

Read More
Business leaders ignore responsibility for data in the cloud

Nine in 10 firms believe cloud service providers have accountability for data security.

Read More
Shadow IT lurks uncomfortably, for IT departments

The growth in ‘Shadow IT’ is leaving IT departments caught between a rock and a hard...

Read More
CIOs reassess their roles in the face of changing business requirements

Research highlights importance of CIOs building internal relationships with sales and marketing to...

Read More

Videos

In this interview, Eric Mink, VP of AI Adoption, shares how MSPs can turn AI curiosity into structured, billable services. He explores commercialisation strategies, vertical specialisation, and building...
Lenaik Andrieux, General Manager – Power Systems EMEA, India & Australia, Rehlko, explains how the acquisition of The Wilmott Group, a UK-based supplier of critical backup-power solutions, makes Rehlko one...
Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
Greg Jones, SVP of MSP Success at Kaseya, discussed the TruPeer initiative and its role in supporting MSPs. He also addressed SMB IT growth, AI adoption, sustainability, and the influence of Gen Y and Gen Z...

Expert Opinions

By Christopher Butler, President, Embedded and Critical Power.
By Ciaran Flanagan, Vice President & Global Head of Data Centre Solutions & Services at Siemens.
By Fiona Reid, Director of International Business at Pattern