Big future for video in the workplace

A new generation is entering the management ranks of companies worldwide, and like previous generations, they will bring with them their own preferred ways of communicating and collaborating. A global study by Cisco has revealed that the majority of these next-generation executives intend to depend...

Read More
ISACA addresses next steps for cybersecurity and the cloud at EuroCACS/ISRM Conference

London conference themed "New Era, New Edge" brings global experts together to examine assurance, risk and security.

Read More
Why BYOD is offering new challenges for IT managers

With news that PC sales are on the decline, attention has now turned towards the issue of mobile communications in the workplace - and the Bring Your Own Device (BYOD) concept in particular. However, as Voyager Networks is experiencing, this change in trend means IT managers are facing a whole new...

Read More
AlienVault broadens Open Threat Exchange™ Initiative

Unified Security Management provider expands OTX initiative to provide free threat intelligence...

Read More
Barracuda Networks integrates SignNow with MobileIron AppConnect

SignNow first eSignature platform in MobileIron App ecosystem.

Read More
BYOD security remains a top business concern

Desktop-as-a-Service could be the key to overcoming BYOD concerns.

Read More
University of St Andrews department scoops awards

The University of St Andrews IT department has won two awards.

Read More
AlienVault rolls out Open Threat Exchange Reputation Monitor AlertSM Service

Free community-sourced service enables organisations to track & receive alerts on threats...

Read More
Sharp increase in blended, automated attacks

FireHost has announced its Q2 2013 Web application attack statistics, which form part of...

Read More
Improved protection and management in a single integrated platform

Panda Security’s new solution allows admin to set URL filtering time limits, ensure employee...

Read More
Growth in external threats, internal breaches and complexity of security

Findings show internal security issues are increasing despite attempts to curb breaches over past...

Read More
WatchGuard introduces Data Loss Prevention solution for Unified Threat Management

WatchGuard® Technologies has introduced a Data Loss Prevention (DLP) solution for its Unified...

Read More
NHS Wales secures information transfers, meets regulatory demands and enhances patient care

National Health Service of Wales extends use of Ipswitch File Transfer technology from 2,000 third...

Read More
ISACA helps enterprises manage vendors using the COBIT 5 Framework

As enterprises increasingly rely on cloud service providers and other vendors to provide...

Read More

Videos

Denis Schertenleib, Nexthink’s Senior Director of Product, believes that the IT service desk won’t survive the next five years and that agentic AI will be the future of IT support. He also discusses...
In this conversation, Mike Anderson, Global Channels Director at EasyDMARC, explains why DMARC has shifted from an optional best practice to a critical requirement for modern organisations. He shares how...
Claire Keelan, UK MD at Onnec, is warning that the UK will fall short of its AI ambitions and data centre expansion targets, unless it tackles the growing workforce shortage by tapping into underused talent...
Andy MacMillan, CEO of Alteryx, explores how organisations can scale AI effectively by empowering business analysts to work with data and probabilistic insights. He discusses building trust in AI outputs and...

Expert Opinions

Sam Kirkman, Director of Services, EMEA at NetSPI, on why organisations need proof, not promise, when it comes to third-party security.
By Brett Candon, VP International at Dropzone AI.
By Andrew Sedman RCDD, Head of Technical Support & Training, Reichle & De-Massari AG.