Proofpoint joins Open Information Security Foundation

Leader in advanced threat protection remains dedicated to supporting open source initiatives following Emerging Threats acquisition.

Read More
CA Technologies strengthens identity-centric security portfolio

CA Technologies has launched new product releases in its identity-centric security portfolio that protect and enable the hybrid enterprise, from cloud, distributed and mobile to mainframe.

Read More
Pulse opens online education centre

Training platform empowers customer development, increases time-to-productivity.

Read More
NEWS
Global cybersecurity - could do better

International survey of information security professionals identifies cloud, mobile devices and...

Read More
‘Segment of One’ for Cloud and Hybrid environment access control

New AppGate XDP release simplifies access security and ensures that all resources – private...

Read More
NEWS
Security heads 2016 agenda

Ipswitch set out to uncover the biggest issues facing IT departments as 2016 approaches. The...

Read More
NEWS
Threat Intelligence identified as 2016 investment priority

Study finds performance, skills, and costs remain biggest hurdles to true data-driven security.

Read More
Achieving compliance objectives

BeyondTrust has introduced the latest version of the company’s privileged password and...

Read More
NEWS
Singapore deploys Gemalto's authentication solution

Gemalto has deployed its Coesys eGov Authentication Server in Singapore, which provides...

Read More
Banking on compliance

Varonis Systems' DatAdvantage for Windows and DatAdvantage for SharePoint solutions help...

Read More
Contextual security intelligence

Balabit has announced the availability of its Contextual Security IntelligenceTM (CSI) Suite. The...

Read More
Exposing haphazard privileged account management practices

76 percent of global survey respondents believe better control of privileged accounts would reduce...

Read More
Research examines real-world networks’ exposure to credential theft attacks

Research provides insights into cyber attacks that abuse hijacked privileged credentials to...

Read More

Videos

Gina Archbold, Channel Business Manager at BlueSnap, provides an update on the company’s Partner Program - explaining how the BlueSnap global payment orchestration platform provides an integrated, single...
In this video, DCS talks to Teksan at the DCA's 10x10 2025
Steve Wilson, Chief AI and Product Officer at Exabeam, discusses the company’s recent report, From Hype to Help: How AI Is (Really) Transforming Cybersecurity in 2025, explaining that there’s no shortage...
Francisco Almada Lobo, Chief Executive Officer and Co-founder and Jeff Winter, Vice President, Business Strategy, both at Critical Manufacturing, provide some great insights as to the themes covered at the...

Expert Opinions

By Hugh McEvoy, Senior Director of Strategy & Business Development at Trimble.
By Matt Sherwen, Managing Director of Sherwen Studios.
By David Knox, Global Director of Energy & Sustainability at Colt DCS.
In the rush to embrace cloud-first strategies, data security has become dangerously misunderstood, and the result is a fragmented, chaotic environment that’s starting to feel like the Wild West.