NEWS
Smartphones to replace traditional access cards

In 2016, less than 5 per cent of organisations used smartphones to enable access to offices and other premises. By 2020, Gartner, Inc. said that 20 per cent of organisations will use smartphones in place of traditional physical access cards.

Read More
Free Cloud-based enterprise IoT Vulnerability Scanner

Retina IoT (RIoT) Scanner enables organizations to reliably identify and remediate vulnerabilities in at-risk IoT devices such as IP cameras, printers, routers.

Read More
NEWS
Bad password habits “like leaving the front door open”

Internet users across the globe are yet to master how to use passwords effectively to protect themselves online. Research from Kaspersky Lab has shown that people are putting their online safety at risk by making bad password decisions and simple password mistakes that may have far-reaching...

Read More
NEWS
New year, new risks: 2017’s top cyber threats

If there’s one thing that 2016 has proved, it’s that cyber threats are relentlessly evolving....

Read More
2017 Predictions

By Jeff Kukowski, Chief Operating Officer, SecureAuth.

Read More
????Global Cyber Alliance appoints Troels Oerting as Chairman of the board

The Global Cyber Alliance (GCA), an international, non-profit organization focused on addressing...

Read More
NEWS
Cybersecurity - could do better

Nuix has  released the findings from its third annual survey of corporate information...

Read More
NEWS
Security concerns hold back Cloud adoption

Findings show that security concerns are a major concern for the majority of businesses considering...

Read More
Security concerns over convergence of personal and workplace identities

90% of IT professionals are concerned about employees using their personal credentials for work...

Read More
Industry leader evaluates growth of cryptographic keys and certificates

Venafi has published the results of a study conducted by Dimensional Research. The study...

Read More
NEWS
2017 infosecurity predictions

  With cyber attacks ranging from Yahoo! to the Democratic National Committee and the...

Read More
Cyclance launches Channel programme

Building security expert community to deliver AI-based protection.

Read More
NEWS
Security does not equal maturity

Organisations spend an average of 5.6 per cent of the overall IT budget on IT security and...

Read More
NEWS
Anomali Labs 2017 predictions

The past year has been a whirlwind tour of challenges and changes. Targeted threat activity...

Read More

Videos

Dan Schiappa, President of Technology and Services at Arctic Wolf, discusses the results of the company’s 2025 AI report, which reveals that AI is rapidly becoming a cornerstone of modern cybersecurity, but...
Paul Savill, Global Practice Leader for Network and Edge at Kyndryl. Spends his time helping major organisations modernise their infrastructure to make the most of AI, strengthen security and prepare for the...
Chris Gilmour, CTO of Axians UK, explains how Axians, the ICT brand of VINCI Energies, and Nokia are deepening their strategic collaboration to drive the next phase of communications infrastructure and mobile...
Benoit Fleury, CPO Business Director at Corning, explains how Corning is collaborating with GlobalFoundries to develop detachable fibre connector solutions for the GF Fotonix™ silicon photonics platform. The...

Expert Opinions

How AI-driven automation helps Managed Service Providers eliminate risk from phishing and data loss before it spreads. By James Griffin, CEO of CyberSentriq.
By Ronald van der Kraan, VP of Broadband for Europe, Middle East and Africa region at CommScope.
By Simon Flowers, Chief Analyst, Wood Mackenzie.