100% of commuters put company data at risk over free public Wi-FI

Commuter study reveals commuters regularly connect to free, unsecure Wi-Fi services during their daily journey, putting personal and company data at risk every week.

Read More
ISACA releases “Configuration Management: Using COBIT 5” to help businesses manage change

Change can cause business disruptions, inefficiencies and financial losses. Proper configuration management (CM) reduces the risk of malfunctions and increases efficiency during times of IT-related change. To help enterprises implement effective CM, global IT association ISACA has released a new...

Read More
3M study reveals French concerns about shoulder surfing

Survey shows nearly half of French adults are concerned about visual data security; almost two fifths have been able to read others’ confidential information.

Read More
Study reveals “big doubts” over mobile compliance

Only 18 percent of organizations are confident that their mobile policies are compliant with...

Read More
Lieberman Software and Qualys integration

Lieberman Software Corporation and Qualys, Inc. have announced the integration between Enterprise...

Read More
Strategic partnership with Ingram Micro UK

Outsourcery plc has agreed a strategic partnership with Ingram Micro UK, a division of Ingram Micro...

Read More
Passive Vulnerability Scanner now available

Drop-in solution identifies security and compliance violations in BYOD, cloud, and Virtual...

Read More
Major vendors and ICT channels come together to address the surge in customer demand for managed services

IT Europa and Angel Business Communications today announced further details of the Managed Services...

Read More
Five steps to prepare for a DDOS attack

By Sean Leach, Vice President of Technology for Verisign.

Read More
Skills gap remains

New report from the UK Commission for Employment and Skills reveals that IT specialists are the new...

Read More
Wick Hill appointed Guidance Software distributor

Wick Hill appointed distributor for Guidance Software - a world leader in digital forensics, cyber...

Read More
Internet Security Days: two days devoted to IT Security

Intensive knowledge exchange by international security specialists on today’s challenges.

Read More
Mobile mayhem?

As organizations embrace digital transformation, application quality is an increasingly important...

Read More
Intel introduces ‘highly versatile’ datacenter processor family

Intel® Xeon® Processor E5-2600 v2 product family offers up to 45 percent greater efficiency...

Read More

Videos

Dr. J Metz, SNIA Chair, explains how AI workloads are extraordinarily complex and constrained by issues related to latency, space, power and cooling, memory, and cost and how addressing these problems through...
Adam Pitton, Heimdal Security cybersecurity advisor and former UK cyber detective, discusses the findings of the company’s recent survey 80 North American MSPs, showing that fragmented security stacks drive...
Adam Salley, Sr. Director, Solutions Specialists, Kaseya, provides a comprehensive, insightful overview of the many topics and technologies impacting the Business Continuity Disaster Recovery (BCDR) landscape...
Adam Salley, Sr. Director, Solutions Specialists, Kaseya, outlines the importance of service productisation and MSP enablement.

Expert Opinions

By Gordon Mueller-Schlomka, Optical Connector Product Designer, Corning Optical Communications.
By Kirsty Paine, Field CTO & Strategic Advisor, Splunk.
BY Jerry Fujii and Naoki Ueyama, Partners in the Tokyo office of Morgan Lewis.