SUSE and it-novum collaborate

openATTIC from it-novum to be available as management front end for future SUSE Enterprise Storage.

Read More
NEWS
BetVictor chooses Talend Big Data integration

Talend to power enhanced customer marketing and insight.

Read More
NEWS
Social engineering leads the list of most popular hacking methods

The recent data breach of 10,000+ Departments of Justice and Homeland Security staff and over 20,000 supposed Federal Bureau of Investigation (FBI) employees is another example that becoming an insider by using social engineering tactics is much easier for hackers than writing...

Read More
White paper examines the drivers and benefits of Edge Computing

As Internet usage becomes more bandwidth intensive and more devices become connected, processing...

Read More
IT professionals overconfident in cyber attack detection

Industry leader evaluates confidence in seven key security controls required to detect cyber...

Read More
Gridstore and 5nine Software form partnership

Gridstore and 5nine Software have formed a strategic technology partnership to leverage the...

Read More
Avnet in EMEA selected as VMware aggregator

Avnet has been selected as an aggregator in EMEA for VMware vCloud Air Network Service Providers...

Read More
Tieto adds Finnish start-up CySec to Security Services ecosystem

Tieto's Security Services start-up is initiating collaboration with CySec Ice Wall Oy (CySec),...

Read More
Gemalto launches IoT solution to monitor smart objects in real time

Gemalto has launched its LinqUs IoT Quality of Service (QoS) offer, a comprehensive solution that...

Read More
Bromium introduces next-generation endpoint protection software solution

Bromium has launched Bromium Advanced Endpoint Security, which integrates endpoint threat...

Read More
NEWS
City Lifeline supports Tech City start-up

Central London data centre City Lifeline is announcing its short-term partnership with tech...

Read More

Videos

Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.
Softcat’s Dean Gardner (Technology Director) and Adam Harding (Head of OCTO) unpack the findings of the organisation's latest Business Tech Report. From agentic AI and ransomware resilience to sustainability...
Francesco Marasco, VP Energy Operations and Sustainability, nLighten, explains why the European data centre provider has published the first ICFEn (Integrated Carbon-Free Energy) scores for its facilities,...

Expert Opinions

By Giedrius Steimantas, Engineering Manager, Oxylabs
This year is set to be a pivotal year for cloud strategy, with repatriation gaining momentum due to shifting legislative, geopolitical, and technological pressures. This trend has accelerated, with a growing...