Five steps businesses need to take to become cyber robust in 2014
  • Posted on 6th January 2014 in by Phil Alsop

One of the biggest challenges for businesses in the New Year is to become ‘cyber robust’ – according to a leading cyber security expert. Jan Veldsink who consults to businesses on IT security and has developed the Business and Cyber Robustness Executive MBA module at Nyenrode...

Read More
2014 looks bright for SMEs
  • Posted on 6th January 2014 in by Phil Alsop

Small to medium sized organisations (SMEs) in the UK are optimistic about business prospects in 2014, according to independent research by data centre and communications specialist, Node4. The survey of 250 decision makers in companies between 50-500 employees, found that 1 in 5 have no concerns at...

Read More
Top seven IT industry trends In 2014
  • Posted on 6th January 2014 in by Phil Alsop

Ian Kilpatrick, chairman of VAD Wick Hill Group, looks forward to the coming year.

Read More
Seculert expands Executive Team
  • Posted on 6th January 2014 in by Phil Alsop

Leading Advanced Threat Protection solution provider hires IT security veterans to help accelerate company growth.

Read More
Happy Secure 2014

AppRiver's senior security analyst, Troy Gill, offers his top 10 list of security resolutions...

Read More
San Miguel Pure Foods selects IBM

San Miguel Pure Foods Company, Inc.(SMPFC), one of the country’s leading food companies, and...

Read More
Queen Elizabeth Olympic Park to help London become digital world leader

Ambitious plans to transform Queen Elizabeth Olympic Park into one of the world’s leading...

Read More
SunGard announces Business Trends for 2014

SunGard Availability Services has revealed its top five predictions for 2014 as businesses look to...

Read More
Red Hat announces general availability of Red Hat Enterprise Linux OpenStack Platform 4.0

Red Hat has announced the general availability of Red Hat Enterprise Linux OpenStack Platform 4.0....

Read More
WatchGuard's top 8 security predictions for 2014

Could a Hollywood hack come true? Will there be a U.S. Healthcare.gov data breach? Should you...

Read More
Cloud feeds on Cloud

According to a recent independent pan-European survey, cloud-based identity and access management...

Read More
The race to stem cybercrime using biometrics is on

Aite Group assesses nine emerging technology vendors that could bring biometric authentication into...

Read More
Blue Coat acquires Norman Shark

Blue Coat Systems, Inc. has acquired Norman Shark, the global leader in malware analysis solutions...

Read More
5 resolutions to prepare IT pros for 2014 trends

ISACA highlights Privacy 2.0, slimmed-down big data, heated-up cybersecurity and data analytics job...

Read More
CIOs seek to maintain relevance through service-led transformations

As IT spend moves to line of business managers, and with more than half spending at least 70% of...

Read More

Videos

Zahl Limbuwala, Operating Partner at DTCP and Chairman of GreenScale, provides a comprehensive update as to the company’s recent investments in Atlantic Hub, a data centre campus developer based in Northern...
In this video we talk to David Bradley from Legrand at DC Ireland 2024
Tal Eisner, Guardz VP of Product Marketing, discusses the findings of the company’s recent MSP survey, which are that MSPs are juggling as many as 10 cybersecurity point solutions to protect their SMB...
Dr. Julia Carpenter, CEO & Cofounder of Apheros, explains how the start-up specialises in thermal management and is developing innovative cooling solutions for data centres and the high-power computing...

Expert Opinions

By Jake Madders, Co-founder and Director at Hyve Managed Hosting.
By Shaun Farrow, Security Practice Lead at Bistech.
By Paul Birkett, VP Strategic Portfolio Management at Ricoh Europe.