NEWS
How the evolution of tokenization can be utilised to better protect data

Traditionally, methods of data protection have focused on locking up their sensitive information away until it was deprotected to be used. While this may work for data that serves no current purpose, simply locking away the data greatly reduces its value, especially if the risks of loss of business...

Read More
NEWS
Securing the cloud: how to address new security risks and future-proof operations post-COVID-19

How can organisations overcome today’s cyber security challenges to protect systems and data within and across multiple cloud environments – and underpin new ways of working since COVID-19? By Phil Aitchison, Chief Operating Officer, Big Data & Security UK&I at Atos.

Read More
NEWS
Are increasing data breaches leaving consumers desensitised?

Cyberattacks are on the rise, with novel cybersecurity risks emerging as companies are currently forced to do business in unprecedented ways. By Stefanie Wood Ellis, AntiFraud Product & Marketing Director, OpSec Security.

Read More
NEWS
Cloud-based multi-factor authentication: the starting point for security, compliance and user experience

Banks and businesses are constantly under pressure to keep their data, customers, and employees secure. This has heightened in the last few months, as the global pandemic has seen cybercriminals ramp up activity. The number of phishing websites increasing by 350% since the start of the year, and...

Read More
NEWS
Before adopting Artificial Intelligence, CISOs must answer the following questions

The use of artificial intelligence (AI) is hugely prevalent in almost all aspects of our day-to-day...

Read More
NEWS
Outside the four walls of the data centre

Almost four in 10 people in the EU began working remotely in the first few months of 2020,...

Read More
NEWS
What to look for in a Next-Gen PAM solution

By Alan Radford, PAM Field Strategist, One Identity.

Read More
NEWS
It is time to stop trusting and start protecting

By James Taylor, Strategic Development Manager for Cyber Security, Nuvias.

Read More
NEWS
Protect the key or don’t bother encrypting your data

By Peter Carlisle, Vice President, nCipher Security.

Read More
NEWS
The C-Suite are exposing themselves to phishing attacks

By David Critchley, Regional Director UK & I, MobileIron.

Read More
NEWS
Five factors that form how Security Awareness training programs are developing

By Elena Molchanova, Head of Security Awareness Marketing, Kaspersky.

Read More

Videos

Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
Softcat’s Dean Gardner (Technology Director) and Adam Harding (Head of OCTO) unpack the findings of the organisation's latest Business Tech Report. From agentic AI and ransomware resilience to sustainability...
Joshua Clay, Senior Director Solutions Engineering at Dynatrace, discusses the findings of the company’s ‘The State of Observability Report 2025’, which reveals that while AI adoption is accelerating,...
In this interview, Dave Baggett, SVP/GM Security Suite at Kaseya, discusses how MSPs can tackle rising complexity, manage vendor sprawl, and stay ahead of high-impact incidents. We explore Kaseya’s unified...

News

Entuity Software V23.0 introduces features designed to optimise IT operations, including agent architecture and real-time telemetry.
Infosecurity Europe 2026 will introduce a Cyber Startup Programme, bringing early-stage cybersecurity companies to the event from 2–4 June at ExCeL London.
FireMon’s latest integration with Illumio merges microsegmentation and firewall policies, promoting Zero Trust implementation across hybrid environments.
Kocho selects Zadara to enhance its cloud infrastructure, aiming to address market demands and easing operational challenges.