Enterprises sitting on security ‘time bomb’

Companies are at serious risk of data security breaches as 43 per cent of UK office workers admit to storing enterprise documents on personal cloud tools and services.

Read More
Wearable tech will drive the rise of the ‘human cloud’ of personal data

Rackspace Hosting has announced findings of an in-depth study into the use of wearable technology and its impact on consumers and businesses. The research finds that, although only 18 per cent of UK and US respondents have actually used wearable technology, 82 per cent of those users in America and...

Read More
The Green Grid takes giant StEP towards e-waste leadership

Collaboration with e-waste think tank aimed at educating organisations on electronic equipment...

Read More
ISACA issues COBIT 5 for Assurance

Establishing confidence in IT processes and controls is important, but audit and assurance...

Read More
Chip-to-application transformation

McAfee introduces two new suites: McAfee Complete Endpoint Protection – Enterprise, and...

Read More
Small to mid-sized business IT budgets surge 19 percent

Hardware purchases drive increase in spending; backup/recovery software and tablets show strong...

Read More
Simplifying mobile security

McAfee has announced that McAfee Enterprise Mobility Management (McAfee® EMM™ software)...

Read More
Carmarthenshire County Council chooses Trustwave

Carmarthenshire County Council recently chose Trustwave SIEM (Security Information and Event...

Read More
CIOs need to optimise BYOD for new technologies

According to a new whitepaper revealed by independent datacentre consultancy, Glasshouse...

Read More
Blue Coat unveils strategy for securely empowering businesses

Blue Coat Systems, Inc. has introduced its Business Assurance Technology blueprint. The five...

Read More
Delivering Scania (Great Britain) Limited UK’s Dealer System Refresh Project

AppSense, in partnership with Ultima Business Solutions, has announced Scania (GB) Limited has...

Read More
Cyber Research-Bericht von Norman Shark deckt ersten großen von Indien ausgehenden Cyberspionageangriff auf 

Bericht zeigt weltweite Angriffe auf Unternehmen und Einrichtungen der nationalen Sicherheit

Read More
Tools zur Geschäftsentwicklung im Bereich Datensicherung in heterogenen virtualisierten Infrastrukturen

VAD TIM bietet seinen Partnern  Unterstützung bei der Konzeption und Realisierung...

Read More

Videos

In this interview, Dr. Brian Luckey, Chief Information Officer, and Kris Laskarzewski, Chief Transformation Officer at Integris, discuss the realities of embedding AI into a services business. From 'fail fast'...
Mike Nagus, CEO of LiNova, a battery tech company, talks backup power infrastructure, UPS and battery technologies – comparing and contrasting traditional approaches and solutions with some of the emerging...
In this interview, Devang Mehta, Co-Founder & Director of Operations and Customer Success at Infrassist, explains how MSPs can move beyond reactive operations to build structured, scalable frameworks for...
Simon Kerr, head of heat networks at EnergiRaven, discusses the recent analysis from EnergiRaven and Viegand Maagøe finds that projected growth in data centres will produce enough waste heat to warm millions...

Expert Opinions

By George Tziahanas, AGC and VP of Compliance at Archive360.
By Lorri Janssen-Anessi, Director of External Cybersecurity Assessments, BlueVoyant
Sam Kirkman, Director of Services, EMEA at NetSPI, on why organisations need proof, not promise, when it comes to third-party security.