Logo

Variations in IT sourcing strategies

Apptio has released its first IT Economics Report profiling enterprise IT spending patterns. Every month, the world’s largest organisations use Apptio’s Cost Transparency application to calculate and analyse over $160 billion in annual combined IT spend. For the Apptio IT Economics Report, the company analysed the IT investments made by its customers last year and found three common resourcing strategies. These patterns, or archetypes, each represent...

Read More

20% of IT professionals have witnessed a security breach cover-up

  • Published in

Javvad Malik, Security Advocate at AlienVault, says results show a need for far greater support for employees and businesses when they fall victim to cyber attacks.

Read More


Positive Security: A new spin on Whitelisting

  • Published in

By David Fisk, EMEA sales director, Quorum.

Read More

CyberArk helps Vodafone

  • Published in

Vodafone has implemented CyberArk to protect and manage its privileged accounts, identities and applications.

Read More

Bitdefender sets new standard for virtualised infrastructure security.

  • Published in

Long-exploited advanced threat vectors in virtualised environments defeated by security experts.

Read More

Sophos has published the findings of its global survey, “The IT Security Team: 2021 and...
MobileIron has published the results of a new consumer sentiment study, which revealed QR codes are...
A report from Trustwave reveals many businesses still struggle with information security...
As cloud transformation accelerates, ThycoticCentrify’s cloud provider solution for AWS provides...
Remote workers pose huge threat as more than half of surveyed organisations predict they will...
HP the first major Cloud Service Provider in the UK to receive this award and one of the first to...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more