ISACA issues first audit programs aligned with COBIT 5

Global IT association ISACA has issued five new audit programs—the first of more than 30 audit programs that will align with COBIT 5. The new audit/assurance programs released today provide assurance over the governance domain processes:

Read More
AlienVault continues rapid expansion of Open Threat Exchange

AlienVault™ has announced continued momentum behind its Open Threat Exchange™ (OTX) initiative with the addition of new partners Cegeka, GoGrid, Netflow Logic, Onsight, Risk I/O and ThreatStop. In addition, the integration of AlienVault’s OTX into Spiceworks has helped IT...

Read More
Pioneering solutions for total UPS power protection

Uninterruptible Power Supplies Limited, a Kohler company, has announced the launch of PowerNSURE, an advanced, integrated battery monitoring and management system for UPS users. This latest development has been augmented with UPSL’s extensive battery care service, which takes a total life...

Read More
Lessons learnt from blocking millions of cyber attacks

FireHost has announced the release of its 2013 year in review Superfecta report (available for download here link and by request). Using real-life data from the 100m+ malicious hack attempts FireHost blocked in the last 12 months, the Superfecta report contains a quarter-by-quarter guide to the...

Read More
Go Digital Newcastle launches to bring a predicted £150m to city economy

Newcastle has launched plans to become one of the UK’s first super-connected cities in a...

Read More
Meeting the multi-device and multi-vendor network challenges

SolarWinds has announced its centralized IP address management solution, SolarWinds IP Address...

Read More
CloudBees added to Verizon Cloud

CloudBees, Inc. has announced an agreement with Verizon Enterprise Solutions to make the CloudBees...

Read More
Vitesse unveils small form factor IC portfolio

Vitesse Semiconductor Corporation has introduced the latest generation of its energy efficient...

Read More
DNA to detect pass-the-hash vulnerabilities

CyberArk has unveiled the latest version of Discovery & Audit (DNA), said to be the first tool...

Read More
Upping the ante for data platforms?

Informatica Corporation has announced Informatica 9.6, the latest release of its award-winning...

Read More
AT&T and Ciena help Itron

Global technology provider for the utility industry deploys managed service to improve company...

Read More
NEC launches scalable enterprise server

NEC Corporation has announced the global release of its Express5800/A2000 Series, a Scalable...

Read More

Videos

Andy MacMillan, CEO of Alteryx, explores how organisations can scale AI effectively by empowering business analysts to work with data and probabilistic insights. He discusses building trust in AI outputs and...
In this conversation, Sam Lambert, EMEA Channel Director at Gigamon, and Richard Betts, Founder and CEO of Vizst Technology, share candid insights into how AI is reshaping security operations. They explore...
Arturo Oliver, Sr. Director of Market Strategy & Analyst Relations at ScienceLogic, discusses why the edge is becoming the new frontier for observability- and what that shift means for enterprises trying to...
Christina Mertens, vice president of business development, EMEA, at VIRTUS Data Centres, explains that, for data centre operators, the question is no longer only where capacity can be deployed quickly, but...

Expert Opinions

Sam Kirkman, Director of Services, EMEA at NetSPI, on why organisations need proof, not promise, when it comes to third-party security.
By Louis Charlton, CEO of Global Commissioning.
Paul Swaddle, Product Manager at Serios Group and Lucy Batley, founder of AI consultancy Traction Industries discuss how organisations can combine data and AI to create meaningful business impact.