Measuring the high costs of Web Malware Protection

A ransomware attack is terrible for consumers, employees and businesses – and you can put a price tag on recovery. By Kowsik Guruswamy, Chief Technology Officer for Menlo Security.

Read More
How to keep passwords from letting the IT industry down

By Jonathan Sander, VP of product, Lieberman Software.

Read More
Fringe defence: identifying devices and protecting your business from cyber attacks

With the rise of the Internet of Things, businesses are now exposed more than ever before to...

Read More
NEWS
Five steps to effectively manage a cyber-attack

By Vijay Bharti, Vice President & Head of Security Services, Happiest Minds.

Read More
How Windows 10 can unite the enterprise

By Ojas Rege, Chief Strategy Officer at MobileIron.

Read More
NEWS
Cybercriminals are ‘following the money’ amidst Office 365 migration

By Lewis Henderson, Director, Client Engagement at Glasswall Solutions.

Read More

Videos

Data Centre World Asia 2025
Maxime Vermeir, Senior Director of AI Strategy at ABBYY, discusses the results from ABBYY’s State of Intelligent Automation: GenAI Confessions 2025 survey, which reveals challenges in implementing Generative...
Daniel Ciobanu, CEO & Co-Founder of CyberGlobal, explains how the cybersecurity industry has become overcrowded and fragmented, making it challenging to differentiate between top-tier providers and generic...
Lucy Darling, a partner at Rider Levett Bucknall (RLB UK), discusses the findings of the organisation’s recent Construction Market Intelligence Q3 2025 report, which finds that power constraints in London...

News

Ataccama unveils a new platform to revolutionise data management, enhancing speed and reliability through intelligent automation and AI readiness.
Datadog Elevates Cloud Storage Management with New Solution
Keysight unveils PNT Xe, enhancing GNSS testing access and performance across development stages.
New research shows a dangerous complacency in UK cybersecurity strategies, leaving businesses exposed in a rapidly evolving threat landscape.