Beware of suspect devices

Two recent incidents show that attacks involving the Internet of Things are becoming a reality. Keith Bird, UK MD of Check Point looks at how smart devices are starting to be exploited.

Read More
Essex County Council chooses Fujitsu for £16.6m IT transformation project

Fujitsu has secured a deal with Essex County Council to transform its Corporate Systems estate. Under the terms of the contract, Fujitsu will implement a fully integrated and modernised ERP environment that also delivers enhanced functionality to retained legacy applications. The project supports...

Read More
ISACA issues first audit programs aligned with COBIT 5

Global IT association ISACA has issued five new audit programs—the first of more than 30 audit programs that will align with COBIT 5. The new audit/assurance programs released today provide assurance over the governance domain processes:

Read More
AlienVault continues rapid expansion of Open Threat Exchange

AlienVault™ has announced continued momentum behind its Open Threat Exchange™ (OTX) initiative with the addition of new partners Cegeka, GoGrid, Netflow Logic, Onsight, Risk I/O and ThreatStop. In addition, the integration of AlienVault’s OTX into Spiceworks has helped IT...

Read More
Lessons learnt from blocking millions of cyber attacks

FireHost has announced the release of its 2013 year in review Superfecta report (available for...

Read More
DNA to detect pass-the-hash vulnerabilities

CyberArk has unveiled the latest version of Discovery & Audit (DNA), said to be the first tool...

Read More
Bit9 partners with Check Point Software Technologies

Bit9 and Check Point® Software Technologies Ltd. has announced a partnership to integrate the...

Read More
Tech Data promotes Andy Gass

Tech Data says that Andy Gass will become Managing Director UK and Ireland, after spending the past...

Read More
New US Cybersecurity Framework developed by NIST features COBIT 5 in the core

ISACA’s COBIT 5 is included as an informative reference in the core of the US Cybersecurity...

Read More
Lancope introduces StealthWatch Labs security updates

Security updates from Lancope’s research team help customers combat today’s...

Read More
AlgoSec partners with Qualys

New integration delivers application-centric vulnerability management, aggregating and scoring...

Read More
St.LukesHealth sees clearly with Varonis

Private health insurance provider knows if an unauthorised user tries to access its sensitive...

Read More
More than 575 million data records lost or stolen in 2013

Over 1.5 million data records were lost or stolen every day in 2013.

Read More
Das Netzwerk als Business Enabler:Cloud-basierte Sicherheitslösungen machen’s möglich

Internetsicherheit ist in den letzten Jahren immer mehr zu einem beweglichen Ziel geworden. Das...

Read More
Tangible business returns from formalised mobility strategies

Global survey of business and IT decision makers reveals that special class of “mobile...

Read More

Videos

We caught up with Manuel Schröder and Carsten Ludwig from R&M during Data Centre World Frankfurt 2025 to hear their take on the latest developments in the data centre sector.
We spoke with Kevin Blumberg from Trane during Data Centre World Frankfurt 2025 to get his thoughts on the company’s role at the event and its contributions to the data centre industry.
Simon Taylor, Chairman at Bioscope and sister company N2S, shares a progress report on the importance of biorefining and bioleaching when it comes to precious metals and the increasing importance of conserving...
At Data Centre World Frankfurt 2025, we spoke with Fernando Calle from Himoinsa about their presence at the event and their role in the data centre industry. Watch the full interview to hear what he had to...

Expert Opinions

By Markus Nispel, CTO of EMEA, Extreme Networks.
By Chris Wysopal, Co-founder and Chief Security Evangelist at Veracode.
By Jon Abbott, Technologies Director - Global Strategic Clients at Vertiv.