ISACA outlines five principles for effective information and technology governance

In new guidance issued today, global IT association ISACA outlines five principles organizations can use to effectively govern and manage their information and technology.

Read More
At least one in three ex-employees left with access to systems or data post termination

Over a third (36%) of desk-based workers in the UK and the US are aware of having continued access to a former employer’s systems or data, with nearly one in 10 actually accessing it.

Read More
Poor password management leaves service accounts open to attack

Survey reveals security professionals don’t practice what they preach when it comes to passwords.

Read More
LANDESK delivers ‘greater freedom and increased productivity’

LANDESK has announced the newest release of LANDESK® Management and Security Suites, adding new features to its Total User Management solution. This release enables greater enterprise speed and scalability, is easier to administer, and provides added focus on user productivity. In addition,...

Read More
Fonix Mobile selects Alert Logic to extend its secure cloud experience

Runs secure messaging and payment platform on Amazon Web Services.

Read More
SMEs ignore important role of IT Manager at their own risk, warns Node4

Independent research finds that over half of SMEs believe the IT manager will be dead by 2024.

Read More
Quantum simplifies deduplication with new DXi-Series powered by StorNext 5

DXi6900 advances high-performance, scalable portfolio for modern data protection workflows.

Read More
Splunk for enterprise security

Splunk Inc. has announced the general availability of version 3.1 of the Splunk® App for...

Read More
Moving to the cloud? Make sure you ask these security questions

By Stephen Coty, Chief security evangelist at Alert Logic.

Read More
New research showing major changes in the market to be presented at the Managed Services & Hosting Summit 2014

New sponsors announced including: Datto, NaviSite, Claranet, Modern Office, QLogic, Virtual...

Read More
DeltaCredit selects Boldon James Classifier to secure information assets

Boldon James delivers data classification to drive DLP solution and prevent data loss incidents.

Read More
IT has growing opportunity to become a strategic provider to the business

IT departments must free themselves from the pressures of tactical necessities before they can be...

Read More
There are just three simple rules of engagement for IoT, according to a new white paper from Flexeye

Whatever their size, interest, geography and industry – all businesses will benefit from...

Read More
UK and US professionals agree that people are the most frequent point of failure in IT Security

A survey amongst 250 IT security professionals, conducted during this year’s Infosecurity...

Read More
Cloud hardware spending breaks $4 billion mark

A new International Data Corporation (IDC) study confirmed that cloud is the major disruption...

Read More

Videos

Martin Jakobsen, Founder and Director of Cybanetix, explains how his team takes a “paranoid” security approach, using AI, automation, and analyst training to proactively detect threats. He discusses why...
DCW Asia 2025 - Part 3 of 3
Dan Evans, Associate Director at Lichfields, discusses the results of the company’s recent data centre study, which finds that, for developers, Scotland offers something few regions or countries can match -...
Work AI leader Glean has launched the Work AI Institute, a first-of-its-kind research initiative - supported by faculty from Stanford, Harvard, Berkeley, Notre Dame, and others - dedicated to decoding what...

Expert Opinions

By David Trossell, CEO and CTO of Bridgeworks
By Nadir Merchant, General Manager, IT Operations Suite, Kaseya.
By TES Group, specialists in manufacturing reliable, high-quality, high-performance power distribution and monitoring systems.