Beware of suspect devices

Two recent incidents show that attacks involving the Internet of Things are becoming a reality. Keith Bird, UK MD of Check Point looks at how smart devices are starting to be exploited.

Read More
Releasing your inner innovator

The role of the IT Director is changing. Having fought for years to gain a seat on the board, with mixed success, the inevitable shift of IT infrastructure to the cloud finally presents the IT Director with a chance to fundamentally change the role and deliver true strategic innovation. Removing...

Read More
Gloucestershire County Council selects Steria

Steria will help to drive efficiencies within Gloucestershire County Council’s ICT infrastructure under an innovative contract which will deliver savings in excess of 25% over current costs, whilst giving the Council the flexibility to respond effectively to changing demands in future.

Read More
Trend Micro SafeSync keeps data safe end-to-end for Calligo’s offshore cloud customers

Trend Micro is pleased to announce a new partnership with Jersey-based cloud provider Calligo, enabling it to offer customers of its offshore cloud a powerful sync and share service with full end-to-end encryption.

Read More
Zscaler SHIFT advances Internet security

Intelligent routing automatically applies adaptive security policy to dynamic Internet threats;...

Read More
Transics outsources IT Infrastructure

European fleet management solutions provider, Transics, has selected SunGard to provide a high...

Read More
NTT Com Security and Palo Alto Networks sign global Managed Security Services agreement

NTT Com Security and Palo Alto Networks have entered into a global managed security services...

Read More
Lessons learnt from blocking millions of cyber attacks

FireHost has announced the release of its 2013 year in review Superfecta report (available for...

Read More
Bit9 partners with Check Point Software Technologies

Bit9 and Check Point® Software Technologies Ltd. has announced a partnership to integrate the...

Read More
DNA to detect pass-the-hash vulnerabilities

CyberArk has unveiled the latest version of Discovery & Audit (DNA), said to be the first tool...

Read More
AlienVault continues rapid expansion of Open Threat Exchange

AlienVault™ has announced continued momentum behind its Open Threat Exchange™ (OTX)...

Read More
Essex County Council chooses Fujitsu for £16.6m IT transformation project

Fujitsu has secured a deal with Essex County Council to transform its Corporate Systems estate....

Read More
ISACA issues first audit programs aligned with COBIT 5

Global IT association ISACA has issued five new audit programs—the first of more than 30...

Read More
More than 575 million data records lost or stolen in 2013

Over 1.5 million data records were lost or stolen every day in 2013.

Read More
St.LukesHealth sees clearly with Varonis

Private health insurance provider knows if an unauthorised user tries to access its sensitive...

Read More

Videos

John Shultz, Chief Product Officer, AI and Learning Officer for Salute, discusses the company’s collaboration with Ecolab, enabling customers to protect their AI investments by reducing complexity and...
Mark Banfield, Chief Revenue Officer at TeamViewer, discusses how the company is using its Tia (TeamViewer Intelligent Assistant) and a ‘shift left’ approach to move IT support from reactive to more...
In this conversation, Daniel Welling, Co-Founder of MSP Finance Team, shares his perspective on the financial realities facing managed service providers today. He explores why profitability can be difficult to...
Sean Burke, CEO at Enteligent, positions 800V DC to 50V DC as the ‘missing piece’ in AI data centre power design. While 800VDC distribution solves the upstream limitations of traditional AC infrastructure,...

Expert Opinions

By Michelle Brophy, Director of Research, Tech, Media & Telecom at AlphaSense.
By Stewart Hunwick, Field CTO, Storage Platforms and Solutions, Dell Technologies.
By Inna Weiner, VP of Product, Data & AI, AppsFlyer.