ISACA issues COBIT 5 for Assurance

Establishing confidence in IT processes and controls is important, but audit and assurance processes often represent a pain point for business partners. Their perception is that assurance processes consume resources, slow activities and can lead to additional work—all to achieve goals they...

Read More
Chip-to-application transformation

McAfee introduces two new suites: McAfee Complete Endpoint Protection – Enterprise, and McAfee Complete Endpoint Protection – Business. These suites are the first to link security from chip to OS to applications, protecting against new threat vectors and bringing critical visibility to...

Read More
Small to mid-sized business IT budgets surge 19 percent

Hardware purchases drive increase in spending; backup/recovery software and tablets show strong...

Read More
Simplifying mobile security

McAfee has announced that McAfee Enterprise Mobility Management (McAfee® EMM™ software)...

Read More
CIOs need to optimise BYOD for new technologies

According to a new whitepaper revealed by independent datacentre consultancy, Glasshouse...

Read More
Carmarthenshire County Council chooses Trustwave

Carmarthenshire County Council recently chose Trustwave SIEM (Security Information and Event...

Read More
Blue Coat unveils strategy for securely empowering businesses

Blue Coat Systems, Inc. has introduced its Business Assurance Technology blueprint. The five...

Read More
Delivering Scania (Great Britain) Limited UK’s Dealer System Refresh Project

AppSense, in partnership with Ultima Business Solutions, has announced Scania (GB) Limited has...

Read More
Cyber Research-Bericht von Norman Shark deckt ersten großen von Indien ausgehenden Cyberspionageangriff auf 

Bericht zeigt weltweite Angriffe auf Unternehmen und Einrichtungen der nationalen Sicherheit

Read More
Tools zur Geschäftsentwicklung im Bereich Datensicherung in heterogenen virtualisierten Infrastrukturen

VAD TIM bietet seinen Partnern  Unterstützung bei der Konzeption und Realisierung...

Read More
Backup-Systeme einrichten und administrieren

Neues Training bei Fast Lane: „Symantec NetBackup 7.5 for UNIX and Windows: Advanced...

Read More
Quantum StorNext übernimmt tragende Rolle in preisgekrönter Visual-Effects-Schmiede

Selbst Oscar-Preisträger brauchen Unterstützung, um mit dem rasanten Wandel in der...

Read More
Corero appoints worldwide sales leader

Corero Network Security is pleased to announce the appointment of David Ahee as Senior Vice...

Read More

Videos

Ian Schenkel, Chief Revenue Officer, Cyber Intelligence House (CIH), explains how the company’s intelligence-driven Cyber Exposure Platform is designed for MSSPs to deliver high margin, high value services...
Adam Salley, Sr. Director, Solutions Specialists, Kaseya, examines the shift to cloud workloads and as well as the importance of commercial flexibility.
In this video, we talk to FlaktGroup at the DCA's 10x10 2025.
Michael Anderson, VP, Business Development at Abstract Security, discusses the launch of the company’s PAINT Partner Program (Partnerships, Alliances, and INTegrations), designed to empower resellers, MSPs,...

Expert Opinions

By Bob Wambach, VP, Portfolio & Strategy, Dynatrace.
Carlos Buenano, CTO for OT at Armis, outlines how cyber exposure management is reshaping protection strategies for remote and critical systems.
By Anna Pavlova, Senior Vice President for Strategy, Market Development, and Sustainability, CarbonQuest.