Der Informationsrisiko-Index:

Warum die Bewertung von Informationsrisiken für mittelständische und große Unternehmen entscheidend sein kann

Read More
Höchste Sicherheit für Patientendaten: HS256S stellt "digitale Schweigepflicht" in Arztpraxen sicher

Wer zum Arzt geht, der muss vertrauen: In erster Linie in die Kompetenz und Professionalität des Mediziners. Aber auch darauf, dass dieser Daten zur Person und Diagnose nicht nur vertrauensvoll behandelt, sondern auch zuverlässig schützt

Read More
Brandentwicklung, Stromausfälle, Einbrüche: Unternehmen sollten Betrieb von Rechenzentren externen Spezialisten überlassen

Brandentwicklung, Stromausfälle, Einbrüche: Ob für die Website, das Intranet oder den Einsatz von Anwendungen im Netzwerk - an dem Betrieb eines oder mehrerer Server kommt heutzutage kein Unternehmen mehr vorbei

Read More
Managed Services & Hosting Summit 2013 – initial sponsors and keynote announced

Sponsors include: AVG, Autotask, Dot Hill, EVault, Gigamon, Interxion and Tarmin; Tiffani Bova, VP...

Read More
Enterprises sitting on security ‘time bomb’

Companies are at serious risk of data security breaches as 43 per cent of UK office workers admit...

Read More
Wearable tech will drive the rise of the ‘human cloud’ of personal data

Rackspace Hosting has announced findings of an in-depth study into the use of wearable technology...

Read More
Bull signs service contract with the Tele Columbus Group

The five year contract will ensure the stability of IT operations at the Berlin-based cable network...

Read More
DP World selects Dimension Data

Solution includes, design, build and support of port network infrastructure including a secure Data...

Read More
The Green Grid takes giant StEP towards e-waste leadership

Collaboration with e-waste think tank aimed at educating organisations on electronic equipment...

Read More
ISACA issues COBIT 5 for Assurance

Establishing confidence in IT processes and controls is important, but audit and assurance...

Read More
Chip-to-application transformation

McAfee introduces two new suites: McAfee Complete Endpoint Protection – Enterprise, and...

Read More
Small to mid-sized business IT budgets surge 19 percent

Hardware purchases drive increase in spending; backup/recovery software and tablets show strong...

Read More
Simplifying mobile security

McAfee has announced that McAfee Enterprise Mobility Management (McAfee® EMM™ software)...

Read More
CIOs need to optimise BYOD for new technologies

According to a new whitepaper revealed by independent datacentre consultancy, Glasshouse...

Read More

Videos

Dan Schiappa, President of Technology and Services at Arctic Wolf, discusses the results of the company’s 2025 AI report, which reveals that AI is rapidly becoming a cornerstone of modern cybersecurity, but...
Conrad Purcell, partner at Haynes Boone, explains how data centre development in sub-Saharan Africa is accelerating, driven by rising digital demand and infrastructure investment. While project finance through...
Rebecca Scottorn, Managing Director of LEK, discusses the company’s recent ‘State of the Energy Industry’ report, providing valuable insights into a range of topics, including decarbonisation and...
Jim Lippie, Chief Product Officer, Kaseya, discusses the recent Kaseya DattoCon 2025 conference, where the company unveiled its latest innovations and previewed its next generation cyber resilience and digital...

Expert Opinions

By Graham Jarvis, Freelance Business and Technology Journalist.
Straightline Consulting’s Craig Eadie discusses how the rapid rise of hyperscale and AI-driven data centres is amplifying project complexity and risk, and why comprehensive commissioning from day one is now...
By Orla Daly, Chief Information Officer at Skillsoft.