vArmour Debuts in EMEA

‘Data Defined Perimeter’ solution protects critical assets wherever they reside by giving enterprises and service providers visibility, control and threat defences for the agile data centre.

Read More
Majority of organisations not confident in ability to protect data after a breach

74 per cent of IT decision-makers believe perimeter security is effective at keeping out security threats, yet 41 per cent believe unauthorised users are able to access their networks.

Read More
Lancope strengthens Cisco pxGrid support

Lancope, Inc. is providing tight product integration with the new Cisco Identity Services Engine (ISE) 1.3, unveiled this week at Interop New York as part of the Cisco Cyber Threat Defense (CTD) Solution 2.0. Cisco ISE is a powerful and flexible attribute-based access control solution that provides...

Read More
Radware appoints Julian McMenamin as Country Manager for Ireland and Scotland

Radware to boost regional presence through McMenamin’s industry experience.

Read More
Dell and Oracle help customers deploy Oracle Business Intelligence Applications

Dell Integrated Systems for Oracle Business Analytics dramatically speeds deployment, management...

Read More
Lack of IT policy on devices putting companies at risk

New research from data recovery specialists, Kroll Ontrack, reveals how companies that don’t...

Read More
Large number of UK companies still in the dark on security

Nearly 10% of UK companies don’t know how many security breaches they have suffered in the...

Read More
£2.5 million to recognise and reduce cyber-attack threats to critical infrastructure

New research co-funded by the Engineering and Physical Sciences Research Council (EPSRC) will focus...

Read More
The Logic Group Maximises payment security

Point-to-Point Encryption reduces merchants’ vulnerability to a data breach or failed audit.

Read More
SignNow appliance brings Cloud Workflow Management to organisations

Barracuda Networks, Inc. has announced the general availability of Barracuda SignNow version 4.0...

Read More
How to beat the top vulnerabilities

By Garry Sidaway, Global Director of Security Strategy at NTT Com Security.

Read More
Very small businesses eager for mobile technology but lack security

Very small businesses (VSBs) with fewer than 25 employees have the same rate of mobile device...

Read More
ManageEngine enhances identity and access management portfolio

ManageEngine, the real-time IT management company, has announced enhancements across its identity...

Read More
Leading IT security technology 8MAN takes Europe ‘by storm’

Software distributor Prianto supports the plans for internationalisation made by Berlin-based...

Read More

Videos

As AI tools evolve into a rapidly growing digital workforce, organisations are being forced to rethink how they secure them. In this conversation, Steve Wilson, Chief AI Officer at Exabeam, explains why AI...
In this discussion, David Primor, CEO of Cynomi, and Dennis Boone, President of SlashBlue, explore why third-party risk management is rapidly becoming essential for MSPs and MSSPs. They share real-world...
Andy, Data & AI Director at Pax8, explores what the agentic inflection point means in practice and how AI is moving beyond experimentation into real-world application. He breaks down the 'empty box' approach...

Expert Opinions

Researchers developed a system that intelligently balances workloads to improve the efficiency of flash storage hardware in a data center.
By Michael Poto - Product Manager - Global Chilled Water Systems at Vertiv.
By René Klein, Executive Vice President, Europe at Westcon-Comstor.
By Danny Kirby (Senior Account Director at Cameo Services) and Iain Burton (Strategic Account Director at RTK Group).