DDoS attacks resemble Advanced Persistent Threats in sophistication

Imperva has released its Q2 2015 Global DDoS Trends Report. The report findings, based on over 3,000 mitigated DDoS attacks and 60 million blocked bot sessions across all sites which were protected using Imperva Incapsula, show a high frequency and long duration of DDoS attacks against...

Read More
Disagreement over security objectives

According to findings from a new global Ponemon study: “2015 Global IT Security Spending & Investments” IT security and IT leaders and their staff members do not agree on security objectives. The study, commissioned by information security leader Dell SecureWorks, surveyed 1,825 IT...

Read More
Data loss due to IT administrator oversights may heighten information security risks

Complex enterprise storage environments call for more thorough backup protocols and investment in technology safeguards.

Read More
Cisco embeds security everywhere

Cisco has introduced new offerings to embed security throughout the extended network – from the data center out to endpoints, branch offices, and the cloud – for pervasive threat visibility and control. By integrating security everywhere, enterprises and service providers gain the...

Read More
Confidence and confusion surround network security

While most C-Level executives are sure their infrastructure is safe, many more admit that better...

Read More
Sophos adds email security

Acquisition of Reflexion Networks delivers effective and easy-to-use email security via the cloud.

Read More
BT secures cloud services integration offering with Check point software technologies

Embedded Cloud Firewall services to help customers move to cloud whilst minimising risk.

Read More
Keys and certificates 'chaos'

Venafi has released the results of its 2015 RSA Conference survey, gathered from nearly 850 IT...

Read More
Integrated threat response and intelligence platform

Leveraging leading global threat intelligence to accelerate cybersecurity response and containment...

Read More
Tenable Network Security extends capabilities of Nessus Agents

Additional coverage for Mac OS X and Linux helps Tenable customers further reduce the attack...

Read More
Proofpoint extends targeted attack protection

Industry-leading advanced malware protection capabilities to secure users across LinkedIn,...

Read More
Rapid pace of technological change makes IT decisions 'more challenging'

Rackspace has revealed results of a new study that reveals two thirds (66 per cent) of surveyed IT...

Read More
SIEM: 3 simple steps to better data protection

By David Howell, European Director, ManageEngine.

Read More
Setting the standard for secure managed file transfer analytics and reporting

Ipswitch has announced the release of Ipswitch Analytics, a new reporting and monitoring solution...

Read More
Rapid7 brings Strategic Security Advisory Services to EMEA 

Rapid7will offer its Strategic Advisory Services in EMEA to help security executives and teams...

Read More

Videos

Caroline Monfrais, Global VP Strategy & Transformation, Wipro Consulting, looks at, for all the talk around cohesive AI implementation strategy and the evolution of AI Agents, what needs to be done now so that...
Tom Artinian, CEO and President of TiniFiber, shares the company’s vision and mission which centres on delivering ultra-rugged, high-speed fiber cabling, connectivity, tools, and solutions that enable...
Chris Carreiro, CTO, Park Place Technologies, explains why so many AI ambitions are faltering and how organisations can navigate this complex landscape. Core issues to address include the underestimation of...
In this video, DCS talks to Teksan at the DCA's 10x10 2025

Expert Opinions

As the streaming landscape evolves, content security through DRM becomes crucial for FAST and AVOD platforms to balance reach with protection.
By Matt Powers, vice president of technology & support services, Wesco.
Artificial intelligence (AI) workloads are already transforming data centres, and at speed. From power and cooling to deployment timelines and security, the infrastructure beneath modern compute is being...
By Mohammad Ismail, VP of EMEA, Cequence Security.