ISACA releases “Configuration Management: Using COBIT 5” to help businesses manage change

Change can cause business disruptions, inefficiencies and financial losses. Proper configuration management (CM) reduces the risk of malfunctions and increases efficiency during times of IT-related change. To help enterprises implement effective CM, global IT association ISACA has released a new...

Read More
100% of commuters put company data at risk over free public Wi-FI

Commuter study reveals commuters regularly connect to free, unsecure Wi-Fi services during their daily journey, putting personal and company data at risk every week.

Read More
GFI Software launches GFI LanGuard 2014

To meet increasing threat levels, GFI expands GFI LanGuard’s vulnerability assessment capabilities to include mobile operating systems, Linux distributions, and even more third-party applications.

Read More
3M study reveals French concerns about shoulder surfing

Survey shows nearly half of French adults are concerned about visual data security; almost two...

Read More
Study reveals “big doubts” over mobile compliance

Only 18 percent of organizations are confident that their mobile policies are compliant with...

Read More
Lieberman Software and Qualys integration

Lieberman Software Corporation and Qualys, Inc. have announced the integration between Enterprise...

Read More
Strategic partnership with Ingram Micro UK

Outsourcery plc has agreed a strategic partnership with Ingram Micro UK, a division of Ingram Micro...

Read More
Passive Vulnerability Scanner now available

Drop-in solution identifies security and compliance violations in BYOD, cloud, and Virtual...

Read More
Major vendors and ICT channels come together to address the surge in customer demand for managed services

IT Europa and Angel Business Communications today announced further details of the Managed Services...

Read More
Wick Hill appointed Guidance Software distributor

Wick Hill appointed distributor for Guidance Software - a world leader in digital forensics, cyber...

Read More
Skills gap remains

New report from the UK Commission for Employment and Skills reveals that IT specialists are the new...

Read More
Five steps to prepare for a DDOS attack

By Sean Leach, Vice President of Technology for Verisign.

Read More
Mobile mayhem?

As organizations embrace digital transformation, application quality is an increasingly important...

Read More
Internet Security Days: two days devoted to IT Security

Intensive knowledge exchange by international security specialists on today’s challenges.

Read More

Videos

Data Centre World Frankfurt 2026
Nirav Shah, Founder & Director of Technical Excellence at Infrassist, explains that 24x7 IT monitoring and defence is essential for SMBs as an often distributed workforce needs protection around the clock, not...
Edgar Van Essen, Managing Director, CCO and Partner for Switch Datacenters, outlines a dramatic decline in water use, new cooperative stakeholder models including green residual heat exchange networks, and a...
Data Centre World London 2026

Expert Opinions

By Inna Weiner, VP of Product, Data & AI, AppsFlyer.
By Graham Jarvis, Freelance Lead Journalist, Business and Technology, Trudy Darwin Communications, for Bridgeworks Ltd.
By Andrea Pleşea, PhD, Co-founder and COO, Druid AI.
By: Brian Kreidler, Team Leader Project Engineering, ZIEHL-ABEGG Inc.