New report helps Victims Service Alliance organisations meet data protection challenge

The Information Commissioner’s Office (ICO) has published a report highlighting how organisations attached to the Victims Services Alliance (VSA) are looking after people’s information in compliance with the Data Protection Act (DPA). 

Read More
Insiders pose the major threat

Vormetric has announced the results of its 2015 Insider Threat Report (ITR), conducted online on its behalf by Harris Poll and in conjunction with analyst firm Ovum in fall 2014 among 818 IT decision makers in various countries, including 408 in the United States. The report details striking...

Read More
Rouse protects employees from spear-phishing with Mimecast cloud email security

IP firm upgrades defences against rising volume of sophisticated phishing attacks.

Read More
Security on the shelf

A report about wasteful spending.

Read More
IT resilience more important than ever as the demand for data expands across all platforms

Vision Solutions Inc. has announced its Seventh Annual State of Resilience Report. Entitled...

Read More
Tough choices ahead for cash-strapped IT departments in 2015

Aging laptop and desktop environments and end of life software challenges drive budget...

Read More
OPSWAT acquires email security provider Red Earth Software

OPSWAT acquires Red Earth Software, extending its advanced threat prevention technology to protect...

Read More
Enterprise Immune system chosen for maritime insurance industry

DNK, a major insurance company for the shipping industry, has selected Darktrace’s Enterprise...

Read More
Tufin highlights three key challenges for data centre migration in 2015

Tufin®, the market-leading provider of Security Policy Orchestration solutions, is spearheading...

Read More
The Vollrath Company selects SimpliVity OmniCube Hyperconverged Infrastructure

Global manufacturer benefits from cost savings and operational efficiency through unsurpassed...

Read More
Azzurri adds to its cyber security credentials

Managed services provider achieves the Government’s new Cyber Essentials Plus accreditation.

Read More
Dell Software’s InTrust helps organisations securely collect, store, search and analyse data

New IT Search feature speeds security investigations and audits with single web interface, allowing...

Read More
Sophos announces the future of comprehensive, simple-to-manage enduser protection

Sophos has announced new versions of key products that deliver on the company’s vision of...

Read More
Cohesive Networks introduces micro-perimeter security

Cohesive Networks has announced the availability of VNS3:turret. As the latest software offering in...

Read More

Videos

Unveiling the science of nickel-zinc (NiZn) batteries. In this video we break down the advantages behind our remarkable chemistry. Discover the key factors that contribute to NiZn's exceptional power, safety,...
Nigel Hedges, Application and Technical Specialist at Fluke Networks explains that, as fibre density increases and performance margins tighten; driven by AI, cloud, and next-generation digital infrastructure,...
In this interview, Devang Mehta, Co-Founder & Director of Operations and Customer Success at Infrassist, explains how MSPs can move beyond reactive operations to build structured, scalable frameworks for...
Andy MacMillan, CEO of Alteryx, explores how organisations can scale AI effectively by empowering business analysts to work with data and probabilistic insights. He discusses building trust in AI outputs and...

Expert Opinions

Sam Kirkman, Director of Services, EMEA at NetSPI, on why organisations need proof, not promise, when it comes to third-party security.
By Sam Manjarres, Director of Product Marketing at WatchGuard Technologies.
By Brian O’Hare, Service Director at BCS Consultancy.