ISACA outlines five principles for effective information and technology governance

In new guidance issued today, global IT association ISACA outlines five principles organizations can use to effectively govern and manage their information and technology.

Read More
Poor password management leaves service accounts open to attack

Survey reveals security professionals don’t practice what they preach when it comes to passwords.

Read More
At least one in three ex-employees left with access to systems or data post termination

Over a third (36%) of desk-based workers in the UK and the US are aware of having continued access to a former employer’s systems or data, with nearly one in 10 actually accessing it.

Read More
US$1 trillion to be spent on telecom and datacom over next five years

Market research firm Infonetics Research released data from its 2014 Telecom and Datacom Network...

Read More
MTI bolsters security offering with EnCase

Guidance Software brings digital investigation capabilities to the MTI Security Practice.

Read More
Kemp introduces load balancers with native WAF

Web application firewall (WAF) services will now be natively integrated in the KEMP Technologies...

Read More
ICT investments in Singapore and Malaysia are on the rise

Enterprises in Singapore and Malaysia will increase their ICT spendings in 2014, says new research...

Read More
SMEs ignore important role of IT Manager at their own risk, warns Node4

Independent research finds that over half of SMEs believe the IT manager will be dead by 2024.

Read More
Fonix Mobile selects Alert Logic to extend its secure cloud experience

Runs secure messaging and payment platform on Amazon Web Services.

Read More
LANDESK delivers ‘greater freedom and increased productivity’

LANDESK has announced the newest release of LANDESK® Management and Security Suites, adding new...

Read More
Quantum simplifies deduplication with new DXi-Series powered by StorNext 5

DXi6900 advances high-performance, scalable portfolio for modern data protection workflows.

Read More
Splunk for enterprise security

Splunk Inc. has announced the general availability of version 3.1 of the Splunk® App for...

Read More
UK and US professionals agree that people are the most frequent point of failure in IT Security

A survey amongst 250 IT security professionals, conducted during this year’s Infosecurity...

Read More
There are just three simple rules of engagement for IoT, according to a new white paper from Flexeye

Whatever their size, interest, geography and industry – all businesses will benefit from...

Read More

Videos

Alex Walsh, Regional VP of Channel Sales, EMEA North at Keepit, discusses the company’s channel-first strategy, broad SaaS data protection, and how MSPs can differentiate amid consolidation and cyber risks,...
Joshua Clay, Senior Director Solutions Engineering at Dynatrace, discusses the findings of the company’s ‘The State of Observability Report 2025’, which reveals that while AI adoption is accelerating,...
Joshua Clay, Senior Director Solutions Engineering at Dynatrace, discusses the findings of the company’s ‘The State of Observability Report 2025’, which reveals that while AI adoption is accelerating,...
DCW Asia 2025 - Part 2 of 3

Expert Opinions

By Fernando Rionegro, Vice President, Cloud and Network Services, Europe at Nokia.
By Penny Heyes, Chief Operating Officer and Co-Founder, and David Clarke, Chief Technology Officer and Co-Founder at The TrustBridge
By Linda Kerr, director of marketing, managed services at WatchGuard Technologies.
By Nico Gaviola, Vice President, Emerging Enterprises and Digital Natives, Databricks.