Seculert expands Executive Team
  • Posted on 6th January 2014 in by Phil Alsop

Leading Advanced Threat Protection solution provider hires IT security veterans to help accelerate company growth.

Read More
Happy Secure 2014
  • Posted on 6th January 2014 in by Phil Alsop

AppRiver's senior security analyst, Troy Gill, offers his top 10 list of security resolutions everyone should be making to stay stafe and out of a criminal's clutches next year:

Read More
San Miguel Pure Foods selects IBM
  • Posted on 6th January 2014 in by Phil Alsop

San Miguel Pure Foods Company, Inc.(SMPFC), one of the country’s leading food companies, and IBM have signed a five-year strategic agreement to optimize the delivery of IT operations support and efficiently address the computing requirements of SMPFC to better serve thousands of users...

Read More
Queen Elizabeth Olympic Park to help London become digital world leader
  • Posted on 24th December 2013 in by Phil Alsop

Ambitious plans to transform Queen Elizabeth Olympic Park into one of the world’s leading digital environments have been unveiled today by the Mayor of London.

Read More
SunGard announces Business Trends for 2014

SunGard Availability Services has revealed its top five predictions for 2014 as businesses look to...

Read More
Red Hat announces general availability of Red Hat Enterprise Linux OpenStack Platform 4.0

Red Hat has announced the general availability of Red Hat Enterprise Linux OpenStack Platform 4.0....

Read More
WatchGuard's top 8 security predictions for 2014

Could a Hollywood hack come true? Will there be a U.S. Healthcare.gov data breach? Should you...

Read More
Cloud feeds on Cloud

According to a recent independent pan-European survey, cloud-based identity and access management...

Read More
The race to stem cybercrime using biometrics is on

Aite Group assesses nine emerging technology vendors that could bring biometric authentication into...

Read More
Blue Coat acquires Norman Shark

Blue Coat Systems, Inc. has acquired Norman Shark, the global leader in malware analysis solutions...

Read More
5 resolutions to prepare IT pros for 2014 trends

ISACA highlights Privacy 2.0, slimmed-down big data, heated-up cybersecurity and data analytics job...

Read More
CIOs seek to maintain relevance through service-led transformations

As IT spend moves to line of business managers, and with more than half spending at least 70% of...

Read More
Orange selects iGATE

Awards iGATE a five-year contract valued at $80 million - with a possible one year extension - to...

Read More
Axis Technology and Delphix partner

Delphix and Axis Technology have announced a partnership, with the goal of accelerating and...

Read More

Videos

Softcat’s Dean Gardner (Technology Director) and Adam Harding (Head of OCTO) unpack the findings of the organisation's latest Business Tech Report. From agentic AI and ransomware resilience to sustainability...
Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.
DCW Asia 2025 - Part 1 of 3
Joshua Clay, Senior Director Solutions Engineering at Dynatrace, discusses the findings of the company’s ‘The State of Observability Report 2025’, which reveals that while AI adoption is accelerating,...

Expert Opinions

By Alistair Barnes, Head of Mechanical Engineering at Colt Data Centre Services.
By Lorenzo Romano, CEO of GCX Managed Services
By Graham Jarvis, Freelance Lead Journalist - Business and Technology, Trudy Darwin Communications