How to implement the US Cybersecurity Framework

The technology that supports and protects an organization’s information is increasingly advanced and connected. It is also increasingly under attack. Earlier this year, the National Institute of Standards and Technology released the US Cybersecurity Framework (CSF) to help critical...

Read More
IL3 accreditation

Platform securely bridges access between IL2 and IL3 data while providing connectivity to the Public Services Network.

Read More
Security breaches can go undiscovered for weeks

Tripwire, Inc has announced the results of a survey of 215 attendees at the Black Hat USA 2014 security conference in Las Vegas, Nevada.

Read More
Increased demand for web apps hampered by lack of critical penetration

Inevitable growth of web apps leading to innovative new use cases yet many organisations still...

Read More
IT professionals lack confidence to manage governance, risk and compliance

Dell Software survey shows nearly 100 percent of respondents in finance, retail and healthcare...

Read More
Lancope appoints Software Development expert Phillip McDonald as Vice President of Engineering

McDonald to leverage over 25 years of proven software engineering expertise to lead a highly...

Read More
IT budgets set to increase according to a third (37%) of financial services organisations

Survey of UK & Ireland financial services sector reveals companies are set to spend as...

Read More
New IBM SyNAPSE chip could open era of vast neural networks

New chip with brain-inspired non-von Neumann computer architecture has one million neurons and 256...

Read More
The Snowden Wasteland

By Calum MacLeod, VP of EMEA at Lieberman Software.

Read More
Skyscape secures Cyber Essentials Plus Scheme

Skyscape Cloud Services Limited has successfully achieved certification for the Government’s...

Read More
nCrypted Cloud launches European Division

nCrypted Cloud has announced the opening of its European operation. nCrypted Cloud is the secure...

Read More
South Korea’s improving economic conditions boost ICT expenditure

Due to the improving economy and enhanced financial prospects in South Korea, enterprises embrace...

Read More
Security enhancements for Thunder ADC portfolio

New features enable organizations to keep up with evolving security threats and compliance...

Read More
Worldwide IT market showing tentative signs of improvement

According to the newly published International Data Corporation (IDC) Worldwide Black Book (Doc...

Read More

Videos

Amber Walsh, Senior Analyst at Bluefield Research, discusses the findings of the company’s new report, U.S. Water for Data Centers: Market Trends, Opportunities, and Forecasts, 2025–2030, which reveals...
Avi Baum, CTO at Hailo, discusses why AI infrastructure needs are already shifting from centralized to edge, how telcos can evolve and future-proof their business to keep up with that transition, and what’s...
Gina Archbold, Channel Business Manager at BlueSnap, provides an update on the company’s Partner Program - explaining how the BlueSnap global payment orchestration platform provides an integrated, single...
Sophie Cheng, Sinch’s SVP of Product Marketing, discusses the findings of the company’s recent report, the state of customer communications, which explores how brands are adapting their engagement...

Expert Opinions

In the rush to embrace cloud-first strategies, data security has become dangerously misunderstood, and the result is a fragmented, chaotic environment that’s starting to feel like the Wild West.
By Tony Hasek, CEO & Co-founder, Goldilock Secure.
By Hugh McEvoy, Senior Director of Strategy & Business Development at Trimble.
By Troels Rasmussen, GM of Security, N-able.