ISACA issues first audit programs aligned with COBIT 5

Global IT association ISACA has issued five new audit programs—the first of more than 30 audit programs that will align with COBIT 5. The new audit/assurance programs released today provide assurance over the governance domain processes:

Read More
AlienVault continues rapid expansion of Open Threat Exchange

AlienVault™ has announced continued momentum behind its Open Threat Exchange™ (OTX) initiative with the addition of new partners Cegeka, GoGrid, Netflow Logic, Onsight, Risk I/O and ThreatStop. In addition, the integration of AlienVault’s OTX into Spiceworks has helped IT...

Read More
Pioneering solutions for total UPS power protection

Uninterruptible Power Supplies Limited, a Kohler company, has announced the launch of PowerNSURE, an advanced, integrated battery monitoring and management system for UPS users. This latest development has been augmented with UPSL’s extensive battery care service, which takes a total life...

Read More
Lessons learnt from blocking millions of cyber attacks

FireHost has announced the release of its 2013 year in review Superfecta report (available for download here link and by request). Using real-life data from the 100m+ malicious hack attempts FireHost blocked in the last 12 months, the Superfecta report contains a quarter-by-quarter guide to the...

Read More
Go Digital Newcastle launches to bring a predicted £150m to city economy

Newcastle has launched plans to become one of the UK’s first super-connected cities in a...

Read More
Meeting the multi-device and multi-vendor network challenges

SolarWinds has announced its centralized IP address management solution, SolarWinds IP Address...

Read More
CloudBees added to Verizon Cloud

CloudBees, Inc. has announced an agreement with Verizon Enterprise Solutions to make the CloudBees...

Read More
Vitesse unveils small form factor IC portfolio

Vitesse Semiconductor Corporation has introduced the latest generation of its energy efficient...

Read More
DNA to detect pass-the-hash vulnerabilities

CyberArk has unveiled the latest version of Discovery & Audit (DNA), said to be the first tool...

Read More
Upping the ante for data platforms?

Informatica Corporation has announced Informatica 9.6, the latest release of its award-winning...

Read More
AT&T and Ciena help Itron

Global technology provider for the utility industry deploys managed service to improve company...

Read More
NEC launches scalable enterprise server

NEC Corporation has announced the global release of its Express5800/A2000 Series, a Scalable...

Read More

Videos

Tom Artinian, CEO and President of TiniFiber, shares the company’s vision and mission which centres on delivering ultra-rugged, high-speed fiber cabling, connectivity, tools, and solutions that enable...
Avi Baum, CTO at Hailo, discusses why AI infrastructure needs are already shifting from centralized to edge, how telcos can evolve and future-proof their business to keep up with that transition, and what’s...
Daniel Thorpe, JLL's Head of Data Center Research, EMEA, outlines the findings of the company’s new "The Future of Quantum Real Estate" report, which details how quantum computing is emerging as the next...
Gina Archbold, Channel Business Manager at BlueSnap, provides an update on the company’s Partner Program - explaining how the BlueSnap global payment orchestration platform provides an integrated, single...

Expert Opinions

By Joe Byrne, Global Field CTO at LaunchDarkly
In the rush to embrace cloud-first strategies, data security has become dangerously misunderstood, and the result is a fragmented, chaotic environment that’s starting to feel like the Wild West.
By Jake Madders, Director and Co-Founder, Hyve Managed Hosting.