Der Informationsrisiko-Index:

Warum die Bewertung von Informationsrisiken für mittelständische und große Unternehmen entscheidend sein kann

Read More
Höchste Sicherheit für Patientendaten: HS256S stellt "digitale Schweigepflicht" in Arztpraxen sicher

Wer zum Arzt geht, der muss vertrauen: In erster Linie in die Kompetenz und Professionalität des Mediziners. Aber auch darauf, dass dieser Daten zur Person und Diagnose nicht nur vertrauensvoll behandelt, sondern auch zuverlässig schützt

Read More
Brandentwicklung, Stromausfälle, Einbrüche: Unternehmen sollten Betrieb von Rechenzentren externen Spezialisten überlassen

Brandentwicklung, Stromausfälle, Einbrüche: Ob für die Website, das Intranet oder den Einsatz von Anwendungen im Netzwerk - an dem Betrieb eines oder mehrerer Server kommt heutzutage kein Unternehmen mehr vorbei

Read More
Managed Services & Hosting Summit 2013 – initial sponsors and keynote announced

Sponsors include: AVG, Autotask, Dot Hill, EVault, Gigamon, Interxion and Tarmin; Tiffani Bova, VP...

Read More
Enterprises sitting on security ‘time bomb’

Companies are at serious risk of data security breaches as 43 per cent of UK office workers admit...

Read More
Wearable tech will drive the rise of the ‘human cloud’ of personal data

Rackspace Hosting has announced findings of an in-depth study into the use of wearable technology...

Read More
Bull signs service contract with the Tele Columbus Group

The five year contract will ensure the stability of IT operations at the Berlin-based cable network...

Read More
DP World selects Dimension Data

Solution includes, design, build and support of port network infrastructure including a secure Data...

Read More
The Green Grid takes giant StEP towards e-waste leadership

Collaboration with e-waste think tank aimed at educating organisations on electronic equipment...

Read More
ISACA issues COBIT 5 for Assurance

Establishing confidence in IT processes and controls is important, but audit and assurance...

Read More
Chip-to-application transformation

McAfee introduces two new suites: McAfee Complete Endpoint Protection – Enterprise, and...

Read More
Small to mid-sized business IT budgets surge 19 percent

Hardware purchases drive increase in spending; backup/recovery software and tablets show strong...

Read More
Simplifying mobile security

McAfee has announced that McAfee Enterprise Mobility Management (McAfee® EMM™ software)...

Read More
CIOs need to optimise BYOD for new technologies

According to a new whitepaper revealed by independent datacentre consultancy, Glasshouse...

Read More

Videos

Dor Eisner, Co-Founder and CEO of Guardz, shares insights from the latest Cybersecurity SMB Report. He discusses the evolving threat landscape, including the impact of AI and automation, and why smaller...
DCW Asia 2025 - Part 1 of 3
James Netherwood, Head of Research Middle East, Capacity and Datacloud, discusses the upcoming Capacity Middle East event and the launch of Datacloud Middle East. The events unite over 3,500 executives from...
Lenaik Andrieux, General Manager – Power Systems EMEA, India & Australia, Rehlko, explains how the acquisition of The Wilmott Group, a UK-based supplier of critical backup-power solutions, makes Rehlko one...

Expert Opinions

As data center construction across North America accelerates, projects are becoming larger, faster and more complex than ever before – and the consequences of getting fire safety wrong have never been...
TES Power’s Operations Director, Martin Brannigan, discusses the challenges in talent shortage.