ISACA outlines five principles for effective information and technology governance

In new guidance issued today, global IT association ISACA outlines five principles organizations can use to effectively govern and manage their information and technology.

Read More
Poor password management leaves service accounts open to attack

Survey reveals security professionals don’t practice what they preach when it comes to passwords.

Read More
At least one in three ex-employees left with access to systems or data post termination

Over a third (36%) of desk-based workers in the UK and the US are aware of having continued access to a former employer’s systems or data, with nearly one in 10 actually accessing it.

Read More
US$1 trillion to be spent on telecom and datacom over next five years

Market research firm Infonetics Research released data from its 2014 Telecom and Datacom Network...

Read More
MTI bolsters security offering with EnCase

Guidance Software brings digital investigation capabilities to the MTI Security Practice.

Read More
ICT investments in Singapore and Malaysia are on the rise

Enterprises in Singapore and Malaysia will increase their ICT spendings in 2014, says new research...

Read More
Kemp introduces load balancers with native WAF

Web application firewall (WAF) services will now be natively integrated in the KEMP Technologies...

Read More
SMEs ignore important role of IT Manager at their own risk, warns Node4

Independent research finds that over half of SMEs believe the IT manager will be dead by 2024.

Read More
Fonix Mobile selects Alert Logic to extend its secure cloud experience

Runs secure messaging and payment platform on Amazon Web Services.

Read More
LANDESK delivers ‘greater freedom and increased productivity’

LANDESK has announced the newest release of LANDESK® Management and Security Suites, adding new...

Read More
Quantum simplifies deduplication with new DXi-Series powered by StorNext 5

DXi6900 advances high-performance, scalable portfolio for modern data protection workflows.

Read More
Splunk for enterprise security

Splunk Inc. has announced the general availability of version 3.1 of the Splunk® App for...

Read More
UK and US professionals agree that people are the most frequent point of failure in IT Security

A survey amongst 250 IT security professionals, conducted during this year’s Infosecurity...

Read More
There are just three simple rules of engagement for IoT, according to a new white paper from Flexeye

Whatever their size, interest, geography and industry – all businesses will benefit from...

Read More

Videos

Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
Lottie Tollman, Head of Data Centres Advisory, EMEA and Gonzalo Martín, Head of Data Centres Capital Markets, EMEA, both at Colliers, the international property adviser, explain why data centres are no longer...
Rishi Kapoor, WW Partner Sales Engineering Leader at Alteryx, shares how Alteryx One and the Partner SE model enable MSPs to transition from infrastructure management to high-value data and AI services. From...
Steven Heinsius, Vice President of Product Management & Marketing EMEA, explains what sets the new Cisco 360 program apart for MSPs. He highlights how it enables outcome-driven managed services and shares...

Expert Opinions

By Samantha Jennings, Head of Operations, Avella.
As data center construction across North America accelerates, projects are becoming larger, faster and more complex than ever before – and the consequences of getting fire safety wrong have never been...
By Ciaran Flanagan, Vice President & Global Head of Data Centre Solutions & Services at Siemens.