3M study reveals French concerns about shoulder surfing
  • Posted on 17th September 2013 in by Phil Alsop

Survey shows nearly half of French adults are concerned about visual data security; almost two fifths have been able to read others’ confidential information.

Read More
Study reveals “big doubts” over mobile compliance
  • Posted on 17th September 2013 in by Phil Alsop

Only 18 percent of organizations are confident that their mobile policies are compliant with corporate policy and government regulation, according to research released by Accellion, Inc., the pioneer in providing enterprise-class, secure mobile productivity solutions, and AIIM, a global non-profit...

Read More
Lieberman Software and Qualys integration
  • Posted on 17th September 2013 in by Phil Alsop

Lieberman Software Corporation and Qualys, Inc. have announced the integration between Enterprise Random Password Manager (ERPM) and the QualysGuard Security and Compliance Suite, providing customers with secure password management for authenticated scanning for IT security and compliance....

Read More
Strategic partnership with Ingram Micro UK
  • Posted on 17th September 2013 in by Phil Alsop

Outsourcery plc has agreed a strategic partnership with Ingram Micro UK, a division of Ingram Micro Inc. (NYSE:IM), the largest global wholesaler of technology products and supply chain management services.

Read More
Passive Vulnerability Scanner now available

Drop-in solution identifies security and compliance violations in BYOD, cloud, and Virtual...

Read More
Major vendors and ICT channels come together to address the surge in customer demand for managed services

IT Europa and Angel Business Communications today announced further details of the Managed Services...

Read More
Wick Hill appointed Guidance Software distributor

Wick Hill appointed distributor for Guidance Software - a world leader in digital forensics, cyber...

Read More
Skills gap remains

New report from the UK Commission for Employment and Skills reveals that IT specialists are the new...

Read More
Five steps to prepare for a DDOS attack

By Sean Leach, Vice President of Technology for Verisign.

Read More
Mobile mayhem?

As organizations embrace digital transformation, application quality is an increasingly important...

Read More
Internet Security Days: two days devoted to IT Security

Intensive knowledge exchange by international security specialists on today’s challenges.

Read More
Intel introduces ‘highly versatile’ datacenter processor family

Intel® Xeon® Processor E5-2600 v2 product family offers up to 45 percent greater efficiency...

Read More
Attenda publishes independent mid-market IT services research findings

Attenda Limited, the Business Critical IT company, has announced the findings from independent...

Read More

Videos

Richard Jelbert, CEO of Cyberrock, discusses how, in today’s fast-changing digital landscape, businesses of all sizes face relentless cyber threats often without the dedicated resources or in-house expertise...
Conrad Purcell, partner at Haynes Boone, explains how data centre development in sub-Saharan Africa is accelerating, driven by rising digital demand and infrastructure investment. While project finance through...
Irvin Shillingford - Regional Manager Northern Europe at Hornetsecurity, discusses the results from the company's annual Ransomware Impact Report, with a rise in ransomware attacks the headline finding. Irvin...

Expert Opinions

In this second instalment of our two-part series, Justin Day, Chief Product Officer at Cloud Gateway, shares practical strategies to assess your readiness and successfully bring NaaS into your organisation in...
Straightline Consulting’s Craig Eadie discusses how the rapid rise of hyperscale and AI-driven data centres is amplifying project complexity and risk, and why comprehensive commissioning from day one is now...
By Luca Rizzo, Segment Manager at ABB Motion High Power.
By Orla Daly, Chief Information Officer at Skillsoft.