4 must read major mid-year cyber security reports
List: Read the big trends of 2016 so far.
Published On16:13, July 29 2016
How much is .web domain worth?
And who outbid google for it?
Published On15:47, July 29 2016
Talend makes IPO move
Big Data firm beats asking price with 5 million share issue
Published On15:32, July 29 2016
Vodafone uses Internet of Things to create ‘smart’ wearables for the Summer
From bikinis to luggage, Vodafone details IOT proof of concept project
Published On15:01, July 29 2016
Microsoft’s plans for its next giant data centre
Mid West server farm gets more money for new facility
Published On14:37, July 29 2016
Deloitte expands cyber managed services
Indicators of compromise promise predictive modelling
Published On14:18, July 29 2016
Study shows business and IT decision makers are aligned on key IT trends
The Dell State of IT Trends 2016 global study says cloud is the main IT spending priority and most important technology trend.
Published On14:05, July 29 2016
Zoho increases European data centre footprint
Signs two location deal with big colo provider
Published On14:03, July 29 2016
Does the traditional IT department exist anymore?
One survey suggests not, as recruitment and talent acquisition shifts
Published On13:54, July 29 2016
DNC 2016: FBI investigates second cyber attack on Democratic Party
News: Emails hacked from the Democratic National Committee have been leaked by Wikileaks and have led to the resignation of the Chair.
Published On11:28, July 29 2016
Trending on CBR
In the spotlight
Methodology for Enterprise Data Quality and Data Governance
Trillium Software recommends tackling data quality issues that can be directly tied to tangible business benefits and growing this solution out,...
An Inside Job: Extending Enterprise Protection to Remote Laptops
IT managers face significant threats from remote workers and business travellers — in fact virtually any employee who takes a laptop home at night...
Leveraging Performance Optimisation for Business Advantage: Bridging the Life-Cycle Gap Between Development, Transactions and Production
This white paper considers the business, IT, and operations challenges of enabling users to proactively find and repair performance and transaction...
The Economic Effects of Virtualisation, Tiered Storage and Hitachi Dynamic Provisioning Software
In an era of explosive data growth and flat or diminishing budgets, organisations must evaluate potential technology purchases not only on their...
Webroot - Security Solutions
Webroot provides industry leading security solutions for consumers, enterprises and small and medium businesses worldwide.
The Neverfail Group is dedicated to creating a world where business applications are continuously available. High Availability, Disaster Recovery...
Capscan is a leading supplier of international address management solutions and data integrity services. Capscan has more than 1800 customers...
Absolute Software - Security Solutions for Mobile Computers and Smartphones
Absolute® Software specialises in technology and services for the management and security of mobile computers and smartphones.