Why BYOD is offering new challenges for IT managers

With news that PC sales are on the decline, attention has now turned towards the issue of mobile communications in the workplace - and the Bring Your Own Device (BYOD) concept in particular. However, as Voyager Networks is experiencing, this change in trend means IT managers are facing a whole new...

Read More
ISACA addresses next steps for cybersecurity and the cloud at EuroCACS/ISRM Conference

London conference themed "New Era, New Edge" brings global experts together to examine assurance, risk and security.

Read More
Big future for video in the workplace

A new generation is entering the management ranks of companies worldwide, and like previous generations, they will bring with them their own preferred ways of communicating and collaborating. A global study by Cisco has revealed that the majority of these next-generation executives intend to depend...

Read More
BYOD security remains a top business concern

Desktop-as-a-Service could be the key to overcoming BYOD concerns.

Read More
Barracuda Networks integrates SignNow with MobileIron AppConnect

SignNow first eSignature platform in MobileIron App ecosystem.

Read More
AlienVault broadens Open Threat Exchange™ Initiative

Unified Security Management provider expands OTX initiative to provide free threat intelligence...

Read More
University of St Andrews department scoops awards

The University of St Andrews IT department has won two awards.

Read More
AlienVault rolls out Open Threat Exchange Reputation Monitor AlertSM Service

Free community-sourced service enables organisations to track & receive alerts on threats...

Read More
Sharp increase in blended, automated attacks

FireHost has announced its Q2 2013 Web application attack statistics, which form part of...

Read More
Improved protection and management in a single integrated platform

Panda Security’s new solution allows admin to set URL filtering time limits, ensure employee...

Read More
Growth in external threats, internal breaches and complexity of security

Findings show internal security issues are increasing despite attempts to curb breaches over past...

Read More
WatchGuard introduces Data Loss Prevention solution for Unified Threat Management

WatchGuard® Technologies has introduced a Data Loss Prevention (DLP) solution for its Unified...

Read More
NHS Wales secures information transfers, meets regulatory demands and enhances patient care

National Health Service of Wales extends use of Ipswitch File Transfer technology from 2,000 third...

Read More
ISACA helps enterprises manage vendors using the COBIT 5 Framework

As enterprises increasingly rely on cloud service providers and other vendors to provide...

Read More

Videos

In this video, DCS talks to VID Firekill at DCW 2025
Mike Hoy, CTO, Pulsant, outlines some of the end user uncertainties related to cloud - discussing network connectivity, data sovereignty and data migration concerns. With AI set to ask further cloud questions,...
Bill Andrews, ExaGrid President and CEO, addresses many of the misconceptions around the cost of different backup storage options, with many end users struggling to understand the long-term costs associated...
Mike Hoy, CTO, Pulsant, outlines some of the end user uncertainties related to cloud - discussing network connectivity, data sovereignty and data migration concerns. With AI set to ask further cloud questions,...

Expert Opinions

By Dan Laun, General Manager, Testing at Perforce.
By Manvinder Singh, VP of Product Management for AI, Redis.