Do private details belong in the Cloud?
  • Posted on 2nd June 2014 in by Phil Alsop

In recent weeks, plans to transfer the medical records of everyone in England to a central NHS database have been met with controversy. Patients have not been informed, trust in the IT systems is waning, and medical and privacy organisations alike have expressed their apprehension, resulting in NHS...

Read More
Malware creation breaks all records
  • Posted on 2nd June 2014 in by Phil Alsop

Trojans were responsible for four out of five infections worldwide.

Read More
HP Works with Swansea University
  • Posted on 2nd June 2014 in by Phil Alsop

Three-year program will utilise HP technology to explore the development of secure, situation-aware, intelligent campuses.

Read More
Skills gap emerges
  • Posted on 2nd June 2014 in by Phil Alsop

The ever-increasing IT skills gap is highlighted again today with the release of research results from central London data centre, City Lifeline. Almost a third (28 per cent) of UK senior IT personnel believe IT equipment has become more complex than five years ago; a huge contributor to...

Read More
eCommerce drives both top and bottom line for B2B companies

In addition to increasing company revenue, increases in profitability per order and average order...

Read More
Symantec development surge produces Mobile Threat Protection

Accelerated development creates new capabilities integrated with enterprise mobility management...

Read More
More than 1 in 8 IT security pros can access previous employers’ systems using old credentials

Just over 13 percent of IT security professionals admit to being able to access previous...

Read More
Worldwide Threat Intelligence Security Services spending to exceed $1.4 billion by 2018

A consistent bombardment of unknown, targeted, and adaptive cyber threats are wreaking havoc in the...

Read More
IT managers now also handling telecoms in over half of cases

New industry survey reveals IT manager is also responsible for telecoms in 52% of businesses.

Read More
User-centric approach to protect, secure and manage mobile devices

Sophos has announced Sophos Mobile Control (SMC) 4.0, the first Enterprise Mobile Management (EMM)...

Read More
ARITHNEA: Zehn Faktoren für erfolgreichen Cross-Channel-Commerce

Cross-Channel-Commerce ist für den Handel heute ein Muss: Die Kunden haben diesen Trend...

Read More
PRTG Network Monitor überwacht die IT-Infrastruktur des T-Systems Innovation Center

Präsentieren unter reibungslosen Bedingungen: Seit kurzem überwacht PRTG Network Monitor...

Read More
Auch Versorger brauchen Grundversorgung: Quantum erneuert Backup-Umgebung der Stadtwerke Rosenheim

Eine Backup-to-Disk-Lösung mit zwei Quantum DXi Deduplizierungsappliances ersetzt die...

Read More
21. MTI Technology-Kongress: Sicherheit für das Big Data Center

Programm aus hochkarätigen Experten- und Anwendervorträgen erstmalig um IT-Security...

Read More

Videos

Martin Jakobsen, Founder and Director of Cybanetix, explains how his team takes a “paranoid” security approach, using AI, automation, and analyst training to proactively detect threats. He discusses why...
Dor Eisner, Co-Founder and CEO of Guardz, shares insights from the latest Cybersecurity SMB Report. He discusses the evolving threat landscape, including the impact of AI and automation, and why smaller...
Dan Evans, Associate Director at Lichfields, discusses the results of the company’s recent data centre study, which finds that, for developers, Scotland offers something few regions or countries can match -...
Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.

Expert Opinions

By Manvinder Singh, VP of Product Management for AI at Redis.
By Chris Ackerson, SVP of Product at AlphaSense.