IBM brings Watson to Africa

IBM has launched a 10-year initiative to bring Watson and other cognitive systems to Africa in a bid to fuel development and spur business opportunities across the world’s fastest growing continent. Dubbed “Project Lucy” after the earliest known human ancestor, IBM will invest...

Read More
Datenklau bei Yahoo! – Wie Nutzer und Unternehmen sich schützen sollten

Yahoo! hat seine Nutzer angewiesen, ihre Passwörter zu ändern, nachdem es durch eine „koordinierte Aktion“ zu einem Datenleck gekommen ist.

Read More
HP-Studie: Gut 80 Prozent aller Anwendungen mit Sicherheitslücken

Neuer "HP Cyber Risk Report" analysiert Schwachstellen in der Unternehmens-IT Mobile Endgeräte, unsichere Software und Java sorgen für neue Risiken

Read More
Report highlights data protection challenges for fostering and adoption agencies

A report published by the Information Commissioner’s Office (ICO) has highlighted the challenges independent fostering and adoption agencies are facing when looking after sensitive personal information.

Read More
OneLogin launches European service for Cloud Identity Management

OneLogin has launched a European service to provide cloud-based Identity and Access Management...

Read More
Akamai Kona Site Defender erzielt bei der Erkennung von Web-Attacken eine Trefferquote von 96 Prozent

Mit der neuen Version von Kona Site Defender verbessert Akamai die Websicherheit noch einmal...

Read More
Silver Peak Accelerated IPsec: Kostenloser Schutz gegen Datendiebstahl

AES-Verschlüsselung mit 256-Bit-Keys für Site-to-Site-VPNs in Verbindung mit...

Read More
Improvements to Akamai Kona Site Defender

Combination of data from Akamai Intelligent Platform and new testing framework improves security...

Read More
Avnet Technology Solutions UK collaborates with international law firm

Simmons & Simmons hosts Avnet’s first FinancialPath™ University event in London.

Read More
Silver Peak counters eavesdropping on corporate networks

Silver Peak has combined the best of site-to-site VPN security and WAN optimisation to deliver...

Read More
WeSecure helps Heemskerk save time and money

Varonis Systems, Inc. is working with the leading security integrator WeSecure to help Heemskerk...

Read More
Dimension Data acquires NextiraOne assets

Dimension Data has acquired certain subsidiaries of NextiraOne, the European multinational company...

Read More
Prolexic warns of cyber attackers targeting stock prices

Prolexic Technologies has shared an analysis of nearly a dozen global DDoS attacks that indicates...

Read More
Serco wins €60m contract to extend IT Support Services to the European Parliament

Serco has been awarded a contract by the European Parliament to consolidate and transform their IT...

Read More
Lancope delivers operational network security and visibility

New capabilities bring users closer to the right data at the right time for vastly improved network...

Read More

Videos

Aleksandar Grbić, Global Data Center Solutions Manager, Hitachi Energy, discusses how the electricity grid must evolve to handle soaring demand from AI data centres. Grid integration and grid resilience have...
Jason Feist, Seagate SVP, Go-to-Market, discusses Seagate Technology’s next-generation Mozaic™ 4+ platform, said to be the industry’s only heat-assisted magnetic recording (HAMR)–based storage platform...
Matthew Martin, Managing Director of Quantum Design Oxford, discusses the critical role that quantum data centres will play in advancing the deployment of quantum technologies. He explains how quantum data...

Expert Opinions

By Louis Charlton, CEO of Global Commissioning.
By Jamie Woodhall, UK Technical and Innovations Manager at Rentokil Specialist Hygiene.
Subzero Engineering discusses why Asia-Pacific is fast becoming the proving ground for next-generation data center infrastructure.
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...