Der Informationsrisiko-Index:

Warum die Bewertung von Informationsrisiken für mittelständische und große Unternehmen entscheidend sein kann

Read More
Höchste Sicherheit für Patientendaten: HS256S stellt "digitale Schweigepflicht" in Arztpraxen sicher

Wer zum Arzt geht, der muss vertrauen: In erster Linie in die Kompetenz und Professionalität des Mediziners. Aber auch darauf, dass dieser Daten zur Person und Diagnose nicht nur vertrauensvoll behandelt, sondern auch zuverlässig schützt

Read More
Brandentwicklung, Stromausfälle, Einbrüche: Unternehmen sollten Betrieb von Rechenzentren externen Spezialisten überlassen

Brandentwicklung, Stromausfälle, Einbrüche: Ob für die Website, das Intranet oder den Einsatz von Anwendungen im Netzwerk - an dem Betrieb eines oder mehrerer Server kommt heutzutage kein Unternehmen mehr vorbei

Read More
Managed Services & Hosting Summit 2013 – initial sponsors and keynote announced

Sponsors include: AVG, Autotask, Dot Hill, EVault, Gigamon, Interxion and Tarmin; Tiffani Bova, VP...

Read More
Enterprises sitting on security ‘time bomb’

Companies are at serious risk of data security breaches as 43 per cent of UK office workers admit...

Read More
Wearable tech will drive the rise of the ‘human cloud’ of personal data

Rackspace Hosting has announced findings of an in-depth study into the use of wearable technology...

Read More
Bull signs service contract with the Tele Columbus Group

The five year contract will ensure the stability of IT operations at the Berlin-based cable network...

Read More
DP World selects Dimension Data

Solution includes, design, build and support of port network infrastructure including a secure Data...

Read More
The Green Grid takes giant StEP towards e-waste leadership

Collaboration with e-waste think tank aimed at educating organisations on electronic equipment...

Read More
ISACA issues COBIT 5 for Assurance

Establishing confidence in IT processes and controls is important, but audit and assurance...

Read More
Chip-to-application transformation

McAfee introduces two new suites: McAfee Complete Endpoint Protection – Enterprise, and...

Read More
Small to mid-sized business IT budgets surge 19 percent

Hardware purchases drive increase in spending; backup/recovery software and tablets show strong...

Read More
Simplifying mobile security

McAfee has announced that McAfee Enterprise Mobility Management (McAfee® EMM™ software)...

Read More
CIOs need to optimise BYOD for new technologies

According to a new whitepaper revealed by independent datacentre consultancy, Glasshouse...

Read More

Videos

Caroline Monfrais, Global VP Strategy & Transformation, Wipro Consulting, looks at, for all the talk around cohesive AI implementation strategy and the evolution of AI Agents, what needs to be done now so that...
David Rimmer, Microgrid Business Leader UK&I at Schneider Electric, outlines the ways in which data centre microgrid deployments can contribute to energy cost savings, energy resilience and independence, and...
Adam Salley, Sr. Director, Solutions Specialists, Kaseya, outlines the importance of service productisation and MSP enablement.
In this video, we talk to RiT Tech at the DCA's 10x10 2025

Expert Opinions

Carlos Buenano, CTO for OT at Armis, outlines how cyber exposure management is reshaping protection strategies for remote and critical systems.
By Krishna Vishnubhotla, Vice President of Product Solutions, Zimperium.
By Ben Coleman, Wholesale Account Director UK at 11:11 Systems.
By Ben Colman, Wholesale Regional Partner Manager for EMEA at 11:11 Systems.