NEWS
You can’t always Stop the Breach - but you should always be able to Spot the Breach
  • Published in

One year on from the debacle of Target’s security breach and has anything really changed? Despite the weeks of forensic analysis and the astronomical cost incurred by the company, retailer after retailer is still falling foul of the same form of malware attack. So just what is going wrong?

Read More
New capabilities on OmniSwitch 6450 and 6250 help businesses address BYOD

Small and medium businesses (SMBs) can now reap the benefits of Alcatel-Lucent Enterprise Unified Access.

Read More
Red Hat launches Red Hat Enterprise Linux 7 Atomic Host

Red Hat provides a purpose-built container host for secure and reliable containerized applications across the open hybrid cloud.

Read More
NEWS
Direct attach versus structured cabling in a data centre

It’s an important decision to make when building a data centre. Our regular columnist, Willy Rietveld, TE Connectivity, writes.

Read More
CA Technologies and Tech Mahindra form IoT agreement

Partnership helps enterprise customers enable new service, improve operational efficiency and...

Read More
Proofpoint launches the Nexgate Social Media Threat Centre

Real-time console details social media threats, risk trends and security effectiveness for...

Read More
NEWS
Councils say current IT lacks the power to transform

Over half of local government senior decision makers are not confident future investment will be...

Read More
NEWS
Unisys wins IT services contracts under the European Commission’s largest ever framework contract

Two Unisys-led consortiums win contracts to support applications, architecture, information...

Read More
Adapt cements its relationship with EMC

Builds Cloud services on cutting edge flash storage.

Read More
NEWS
Using the hybrid cloud for a major project

By Stefan Haase, product director, Redcentric.

Read More
Ingram Micro Europe participates in Microsoft's Cloud Solution Provider Program

Ingram Micro Inc. is to participate in the Microsoft Cloud Solution Provider (CSP) program in...

Read More
NEWS
Fibre specifications form data centre fabric foundation

OpenOpticsMSA specifications provide a roadmap for streaming terabits of data over a single strand...

Read More

Videos

Joshua Clay, Senior Director Solutions Engineering at Dynatrace, discusses the findings of the company’s ‘The State of Observability Report 2025’, which reveals that while AI adoption is accelerating,...
Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.
James Netherwood, Head of Research Middle East, Capacity and Datacloud, discusses the upcoming Capacity Middle East event and the launch of Datacloud Middle East. The events unite over 3,500 executives from...
Rebecca Scottorn, Partner at L.E.K. Consulting and part of the global Industrials Practice, discusses the company’s recent ‘State of the Energy Industry’ report, providing valuable insights into a range...

Expert Opinions

By TES Group, specialists in manufacturing reliable, high-quality, high-performance power distribution and monitoring systems.
By Giedrius Steimantas, Engineering Manager, Oxylabs
By Richard Mitchell, Head of Channel, ThreatAware
By Eric Herzog, Chief Marketing Officer at Infinidat.