skip to main content
Close Icon We use cookies to improve your website experience. To learn about our use of cookies and how you can manage your cookie settings, please see our Cookie Policy. By continuing to use the website, you consent to our use of cookies.
Informa Tech short banner

Our Media

Engage with your target audience via authoritative, specialized digital properties


Operating across all the key ICT markets, Informa Tech’s digital media platforms provide you with an unrivalled opportunity to engage with our global audience all year round.

No other media network in the communications industry can compete with the quality of readership and global reach of the Informa Tech media portfolio. Our unparalleled reach puts your brand and marketing message in front of leading tech decision makers worldwide.

Our goal is to challenge community members to think about technology by providing strong, even unconventional points of view, backed by hard-nosed reporting, hands-on experience and the professional knowledge that comes only with years of tech industry experience.

The Informa Tech media portfolio comprises market-leading digital properties such as AI Business, Data Center Knowledge, Dark Reading, Gamasutra, InformationWeek, ITPro Today, Light Reading, Network Computing, and WardsAuto.

 

4m
Monthly Unique Visitors
40
Media Publications
150k
Social Media Members and Followers
500k
Media Newsletter Subscribers
white background

Discover More Solutions

↓ View a list of recent publications below ↓

Hide filters
Select filters

Privileged Access Management as-a-Service: Protecting the Keys to Your Kingdom

  • 30 May 2022
  • Optiv
  • InformationWeek

Your privileged accounts are a significant risk - and not just from external hackers. 26% of businesses have users with more access privileges than required for their job — meaning malicious insiders may have already what they need to damage your organization. Read More

Your privileged accounts are a significant risk - and not just from external hackers. 26% of businesses have users with more access privileges than required for their job — meaning malicious insiders may have already what they need to damage your organization. Read More

Read More

Nordic streamer Ruutu takes ‘SAS: Who Dares Wins’ into Finland

  • 30 May 2022
  • Richard Middleton
  • Television Business International (TBI)

Nelonen’s Nordic SVOD platform Ruutu has ordered a local version of SAS: Who Dares Wins, to be produced by Banijay Finland. The show is set to air this year and will feature a line-up of celebrities who will undertake a unique version of the special forces selection process to discover if they have what is required […] Read More

Nelonen’s Nordic SVOD platform Ruutu has ordered a local version of SAS: Who Dares Wins, to be produced by Banijay Finland. The show is set to air this year and will feature a line-up of celebrities who will undertake a unique version of the special forces selection process to discover if they have what is required […] Read More

Netflix & Channel 4 link for ‘Five Star Chef’

  • 30 May 2022
  • Mark Layton
  • Television Business International (TBI)

Global streamer Netflix and UK broadcaster Channel 4 have teamed to jointly commission Five Star Chef, a new culinary competition series with a restaurant as the grand prize. Created by Twenty Twenty, the firm behind First Dates and A House Through Time, the 6 x 60-minute series pits ambitious chefs against one another in the […] Read More

Global streamer Netflix and UK broadcaster Channel 4 have teamed to jointly commission Five Star Chef, a new culinary competition series with a restaurant as the grand prize. Created by Twenty Twenty, the firm behind First Dates and A House Through Time, the 6 x 60-minute series pits ambitious chefs against one another in the […] Read More

Critical OAS Bugs Open Industrial Systems to Takeover

  • 28 May 2022
  • Jai Vijayan, Contributing Writer, Dark Reading
  • Dark Reading

The most serious flaw gives attackers a way to remotely execute code on systems that many organizations use to move data in critical ICS environments, security vendor says. Read More

The most serious flaw gives attackers a way to remotely execute code on systems that many organizations use to move data in critical ICS environments, security vendor says. Read More