ISACA releases “Configuration Management: Using COBIT 5” to help businesses manage change

Change can cause business disruptions, inefficiencies and financial losses. Proper configuration management (CM) reduces the risk of malfunctions and increases efficiency during times of IT-related change. To help enterprises implement effective CM, global IT association ISACA has released a new...

Read More
100% of commuters put company data at risk over free public Wi-FI

Commuter study reveals commuters regularly connect to free, unsecure Wi-Fi services during their daily journey, putting personal and company data at risk every week.

Read More
GFI Software launches GFI LanGuard 2014

To meet increasing threat levels, GFI expands GFI LanGuard’s vulnerability assessment capabilities to include mobile operating systems, Linux distributions, and even more third-party applications.

Read More
3M study reveals French concerns about shoulder surfing

Survey shows nearly half of French adults are concerned about visual data security; almost two...

Read More
Study reveals “big doubts” over mobile compliance

Only 18 percent of organizations are confident that their mobile policies are compliant with...

Read More
Lieberman Software and Qualys integration

Lieberman Software Corporation and Qualys, Inc. have announced the integration between Enterprise...

Read More
Strategic partnership with Ingram Micro UK

Outsourcery plc has agreed a strategic partnership with Ingram Micro UK, a division of Ingram Micro...

Read More
Passive Vulnerability Scanner now available

Drop-in solution identifies security and compliance violations in BYOD, cloud, and Virtual...

Read More
Major vendors and ICT channels come together to address the surge in customer demand for managed services

IT Europa and Angel Business Communications today announced further details of the Managed Services...

Read More
Wick Hill appointed Guidance Software distributor

Wick Hill appointed distributor for Guidance Software - a world leader in digital forensics, cyber...

Read More
Skills gap remains

New report from the UK Commission for Employment and Skills reveals that IT specialists are the new...

Read More
Five steps to prepare for a DDOS attack

By Sean Leach, Vice President of Technology for Verisign.

Read More
Mobile mayhem?

As organizations embrace digital transformation, application quality is an increasingly important...

Read More
Internet Security Days: two days devoted to IT Security

Intensive knowledge exchange by international security specialists on today’s challenges.

Read More

Videos

Data Centre World London 2026
Shahar Belkin, Chief Evangelist at ZutaCore, explains how the company’s OmniTherm™ cold plate enables waterless two-phase cooling for manufacturers building servers with the NVIDIA RTX PRO 6000 Blackwell...
Falk Weinreich, CEO of Portus Data Centers, discusses the company’s focus on the DACH region, with plans to accelerate expansion of their existing data centre portfolio – most immediately with the...

Expert Opinions

By David Trossell, CEO and CTO of Bridgeworks
By Andrea Pleşea, PhD, Co-founder and COO, Druid AI.
Connectivity, Not Compute, Will Decide the AI Race. By Mahesh Krishnaswamy, Founder and CEO of Taara.
By Frank Warren, SVP, Global Operations, Park Place Technologies.