Blind trust is not a security strategy

By Lilac Schoenbeck, VP of Product Marketing and Development, iland.

Read More
Do you know where your archive call recording data Is?

Organisations that fail to take data seriously are not only risking the safety of their customers’ most sensitive information, but also gambling with their own business reputation. Matt Bryars, CEO of Aeriandi discusses the importance of data storage, archive and retrieval solutions and...

Read More
NEWS
Why you should prioritise cyber security irrespective of your company’s size

Small companies are just as vulnerable to cyber-attacks as larger organisations, says Isaac...

Read More
What can we learn from some of the most devastating cyber attacks?

By Isaac George, SVP and UK Regional Head, Happiest Minds.

Read More
Bank heists for the digital age

By Kirill Slavin, Managing Director at Kaspersky Lab.

Read More
NEWS
Filling the gaps in network security strategies

By Jan Hof, International Marketing Director, ForeScout Technologies.

Read More
NEWS
Why people are the key to cybersecurity

By Sean Paxton, Product Manager of Networks at Redcentric.

Read More
NEWS
Digital disaster?

There’s a significant downside to the Digital Age, and it’s only going to become worse, as...

Read More
Keeping up with a rapidly advancing cyber threat landscape

Why today’s cyber security strategy needs to focus more on data protection technologies and...

Read More

Videos

In this conversation, ESET UK Country Manager, Matt Knell, discusses why MSPs must move beyond basic endpoint protection and adopt a layered, proactive security approach. He shares practical insights on MDR...
In this interview, Dave Baggett, SVP/GM Security Suite at Kaseya, discusses how MSPs can tackle rising complexity, manage vendor sprawl, and stay ahead of high-impact incidents. We explore Kaseya’s unified...
DCW Asia 2025 - Part 3 of 3
DCW Asia 2025 - Part 2 of 3

News

Securonix launches Sam, the AI SOC Analyst, and Agentic Mesh with AWS, introducing a new AI-driven operating model for security operations.
Integris demonstrates a practical application of AIOps, refining service delivery with the Client-Zero model for improved operational efficiency.
N-able's annual Empower 2026 conference will host cybersecurity experts and MSPs in Fort Lauderdale to explore resilient security strategies.
Zenoo integrates Signicat's ReadID technology, aiding European businesses in tackling fraud amidst rising regulatory expectations.