Corero announces integration with Verisign OpenHybrid

Corero Network Security has announced its integration with Verisign OpenHybrid and support for Verisign’s open standards-based approach for hybrid DDoS solutions. For Verisign and Corero customers, this integration combines on-premises technology from Corero Network Security to defeat...

Read More
Widening gap between perimeter security perception and reality

While 87% of IT decision-makers feel their organisation’s perimeter security is effective at keeping out security threats, 30% of IT decision-makers admit their company has fallen victim to a data breach.

Read More
Monitoring overall network health

Industry leader in continuous network monitoring introduces Assurance Report Cards in its flagship product to help customers align security policies with business objectives.

Read More
AlienVault  launches Beta version of Open Threat Exchange 2.0

Company continues to see rapid growth for its unique crowd-sourced Open Threat Exchange with 26,000...

Read More
Akamai Cloud Security Intelligence is the foundation for new services

Recognising the crucial role data analytics play in more effectively fighting cloud security...

Read More
FireMon acquires mmediate Insight to expand security solutions portfolio

Acquisition delivers first-ever combination of proactive network security intelligence and...

Read More
CipherCloud unveils Global Compliance Resource Centre

Interactive online resource details data privacy laws in more than 80 countries.

Read More
Data security - top tips for senior managers

Ian Kilpatrick, chairman Wick Hill Group, explains why senior managers now need to be more involved...

Read More
NHS Dumfries and Galloway adopts a proactive approach to safeguarding patient data

Guarding against security threats with a state-of-the-art vulnerability management solution.

Read More
Safeguarding storage from unauthorised access

Lock & Key is part of Imation’s recently announced Secure Data Movement Architecture...

Read More
Majority of IT pros don’t see senior management taking enough responsibility for insider threat

IS Decisions report finds that IT professionals want more involvement from senior management on...

Read More
Singtel to acquire Trustwave

New strategic investor to help take Trustwave to the next level by accelerating growth.

Read More
Protectig digital information everywhere

Vera has emerged from stealth and unveiled its new data security solution built to give enterprises...

Read More
BeyondTrust helps University of Winchester strengthen security without hampering productivity

Least privilege model reduces security risk and supports overhead for a top 20 university.

Read More

Videos

In this video, DCS talks to SWEP at the DCA's 2025 10x10 Event
In this video, DCS talks to Lenovo at the DCA's 2025 10x10 Event
Helena Fagraeus Lundström, T.Loop CEO, explains how T.Loop designs, builds and operates Data Energy Centers®, realised “on the edge” in buildings with heating needs that match with Data Energy...
In this video, DCS talks to Accelsius at the DCA's 2025 10x10 Event

Expert Opinions

By Jon Dodkins, Head of Technical Solutions at Headforwards.
By David Brown, SVP International Business, FireMon.
Adult skills expert, Kevin Vashi at Netcom Training will discuss why in times of crisis, UK businesses should prioritise the onboarding and training of cybersecurity professionals.
By Duncan Roberts, Associate Director at Cognizant Research.