4 must read major mid-year cyber security reports
List: Read the big trends of 2016 so far.
Published On16:13, July 29 2016
How much is .web domain worth?
And who outbid google for it?
Published On15:47, July 29 2016
Talend makes IPO move
Big Data firm beats asking price with 5 million share issue
Published On15:32, July 29 2016
Vodafone uses Internet of Things to create ‘smart’ wearables for the Summer
From bikinis to luggage, Vodafone details IOT proof of concept project
Published On15:01, July 29 2016
Microsoft’s plans for its next giant data centre
Mid West server farm gets more money for new facility
Published On14:37, July 29 2016
Deloitte expands cyber managed services
Indicators of compromise promise predictive modelling
Published On14:18, July 29 2016
Study shows business and IT decision makers are aligned on key IT trends
The Dell State of IT Trends 2016 global study says cloud is the main IT spending priority and most important technology trend.
Published On14:05, July 29 2016
Zoho increases European data centre footprint
Signs two location deal with big colo provider
Published On14:03, July 29 2016
Does the traditional IT department exist anymore?
One survey suggests not, as recruitment and talent acquisition shifts
Published On13:54, July 29 2016
DNC 2016: FBI investigates second cyber attack on Democratic Party
News: Emails hacked from the Democratic National Committee have been leaked by Wikileaks and have led to the resignation of the Chair.
Published On11:28, July 29 2016
Trending on CBR
In the spotlight
The Human Factor in Laptop Encryption: UK Study
Encryption is one of the most important security tools in the defense of information assets. Ponemon Institute has conducted numerous studies on...
Tiered Storage Economics: Defining and Calculating the Economic Benefit of Dynamic Tiered Storage Solutions
As IT architects and storage planners continue to look at best practices and technologies to proactively reduce ownership costs, dynamic tiered...
PCI Compliance for Dummies
Complying with the PCI Data Security Standard may seem like a daunting task for merchants. This guide explains how to protect cardholder data and...
Stopping The Rot - How To Prevent Data Decay
Incorrect, incomplete or ‘dirty’ address data incurs unnecessary costs on the business in terms of wasted time as well as money. Failed, delayed or...
Teneo - Infrastructure Management, Performance and Virtualization Services
Teneo is an infrastructure optimization company, providing solutions that help customers with the management, performance and virtualization of...
Qualys - IT security risk and compliance solutions
Qualys is the leading provider of on demand IT security risk and compliance solutions - delivered as a service. Qualys solutions enable...
Absolute Software - Security Solutions for Mobile Computers and Smartphones
Absolute® Software specialises in technology and services for the management and security of mobile computers and smartphones.
Capscan is a leading supplier of international address management solutions and data integrity services. Capscan has more than 1800 customers...