Unisys unveils Stealth solution

New Unisys Stealth for Mobile solution protects against data breaches and other cybersecurity risks created by proliferation of consumer devices in the workplace.

Read More


Beta release of Red Hat Enterprise Linux 6 now available

To keep pace with the demand for enterprise-class infrastructure, the newest version of the leading Linux platform, the beta release of Red Hat Enterprise Linux 6.5, extends its scalability and manageability to aid in the build-out and control of large, complex IT environments. For example, Red Hat Enterprise Linux 6.5 will be designed to simplify the operation of mission-critical SAP applications by automating the optimal configuration of common SAP deployments.

Read More


Global study shows need for C-level leadership

Capgemini Consulting, in partnership with MIT Sloan Management Review, has announced the findings of a new global research survey into Digital Transformation – the opportunity for radical business change offered by the convergence of new digital technologies such as social media, mobile, analytics, and embedded devices. The study, “Embracing Digital Technology: A New Strategic Imperative,” reveals that while the potential opportunity of Digital Transformation is absolutely...

Read More

Becrypt continues innovation

Latest version of Advanced Port Control provides the only CAPS approved Port Control solution for high grade security levels.

Read More

Kaspersky, a global cybersecurity company, and INTERPOL have signed a new five-year agreement to...
ThreatQuotient has released the State of Cyber Security Automation Adoption in 2021, new research...
On average, UK organisations need an additional £1.88m and 22 new IT staff each to shorten the...
Nearly half (49%) of organizations plan to extend Cognitive and AI capabilities for security to...
Shadow IT and a lack of business continuity planning present growing threats.
“Securing the New Hybrid Workplace” report from Entrust found 91% of employees are in favor of...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more