NEWS
Smartphones to replace traditional access cards

In 2016, less than 5 per cent of organisations used smartphones to enable access to offices and other premises. By 2020, Gartner, Inc. said that 20 per cent of organisations will use smartphones in place of traditional physical access cards.

Read More
Free Cloud-based enterprise IoT Vulnerability Scanner

Retina IoT (RIoT) Scanner enables organizations to reliably identify and remediate vulnerabilities in at-risk IoT devices such as IP cameras, printers, routers.

Read More
NEWS
Bad password habits “like leaving the front door open”

Internet users across the globe are yet to master how to use passwords effectively to protect themselves online. Research from Kaspersky Lab has shown that people are putting their online safety at risk by making bad password decisions and simple password mistakes that may have far-reaching...

Read More
NEWS
New year, new risks: 2017’s top cyber threats

If there’s one thing that 2016 has proved, it’s that cyber threats are relentlessly evolving....

Read More
2017 Predictions

By Jeff Kukowski, Chief Operating Officer, SecureAuth.

Read More
????Global Cyber Alliance appoints Troels Oerting as Chairman of the board

The Global Cyber Alliance (GCA), an international, non-profit organization focused on addressing...

Read More
NEWS
Cybersecurity - could do better

Nuix has  released the findings from its third annual survey of corporate information...

Read More
NEWS
Security concerns hold back Cloud adoption

Findings show that security concerns are a major concern for the majority of businesses considering...

Read More
Security concerns over convergence of personal and workplace identities

90% of IT professionals are concerned about employees using their personal credentials for work...

Read More
Industry leader evaluates growth of cryptographic keys and certificates

Venafi has published the results of a study conducted by Dimensional Research. The study...

Read More
NEWS
2017 infosecurity predictions

  With cyber attacks ranging from Yahoo! to the Democratic National Committee and the...

Read More
Cyclance launches Channel programme

Building security expert community to deliver AI-based protection.

Read More
NEWS
Security does not equal maturity

Organisations spend an average of 5.6 per cent of the overall IT budget on IT security and...

Read More
NEWS
Anomali Labs 2017 predictions

The past year has been a whirlwind tour of challenges and changes. Targeted threat activity...

Read More

Videos

Nigel Hedges, Application and Technical Specialist at Fluke Networks explains that, as fibre density increases and performance margins tighten; driven by AI, cloud, and next-generation digital infrastructure,...
Unveiling the science of nickel-zinc (NiZn) batteries. In this video we break down the advantages behind our remarkable chemistry. Discover the key factors that contribute to NiZn's exceptional power, safety,...
Rishi Kapoor, WW Partner Sales Engineering Leader at Alteryx, shares how Alteryx One and the Partner SE model enable MSPs to transition from infrastructure management to high-value data and AI services. From...
In this interview, Lorenzo Romano, CEO of GCX, explores the shift from traditional Service Level Agreements to Experience Level Agreements and what it means for MSPs delivering managed connectivity. He...

Expert Opinions

By Matt Middleton-Leal, Managing Director EMEA, Qualys
By Samantha Jennings, Head of Operations, Avella.
By Lorri Janssen-Anessi, Director of External Cybersecurity Assessments, BlueVoyant
Mike Hoy, CTO, Pulsant, and Mike Hellers, Product Development Manager, LINX, on how hosting data locally in Scotland supports optimal speeds and reliability, complementing wider UK connectivity for consistent...