Businesses must be savvy to mobile security threats as app adoption spikes

Introducing adequate security into the software’s design at the initial building stage is crucial.

Read More
NETSCOUT enters the advanced threat Market

NETSCOUT ISNG platform and Arbor Networks Spectrum delivers smart data and analytics.

Read More
NEWS
As GDPR approaches, retail data breaches remain unacceptably high

Two in five retailers across the globe have experienced a data breach in the past year, according to the 2017 Thales Data Threat Report, Retail Edition.

Read More
CIF enhances its Code of Practice to support GDPR compliance for CSPs

CIF provides the only certification for CSPs who want to better position themselves as GDPR ready.

Read More
Telehouse now offering Verisign DDoS Protection Services

Telehouse is now offering Verisign’s Distributed Denial of Service (DDoS) Protection Services...

Read More
69% of UK boards neglect GDPR compliance

IT decision-makers report inadequate levels of sponsorship from the C-suite despite the General...

Read More
NEWS
Consumers confused about encryption back doors

Sixty-five percent believe they shouldn’t be forced to hand over encrypted private data to...

Read More
NetWitness Suite redefines SIEM

Accelerates threat detection and response, provides additional depth of visibility, ...

Read More
NEWS
A UK business will spend more than ?1m recovering from a data security breach

The cost of recovering from of a security breach for UK organisations has been estimated in a new...

Read More
NEWS
Bridging the gap between risk and network teams

Patented technology simulates cyberattacks, helping companies reduce the time to prioritize risk...

Read More
NEWS
Cybersecurity operational challenges are growing

Results identify key factors that are contributing to profound enterprise weaknesses in...

Read More
NEWS
Security professionals under-prepared for cyber attacks

One in three (32%) security professionals lack effective intelligence to detect and action cyber...

Read More
NEWS
Cisco to acquire Observable Networks

Observable Networks’ technology is based on dynamic behavioral modeling of all devices on the...

Read More
Businesses overly confident about keeping hackers at bay,

94% of IT professionals feel perimeter security is effective at keeping unauthorised users out of...

Read More

Videos

In this interview, Kristen Knight, newly appointed VP of Channel Sales at Portnox, discusses the launch of the company’s global partner programme and its cloud-native, passwordless approach to network access...
Unveiling the science of nickel-zinc (NiZn) batteries. In this video we break down the advantages behind our remarkable chemistry. Discover the key factors that contribute to NiZn's exceptional power, safety,...
Rishi Kapoor, WW Partner Sales Engineering Leader at Alteryx, shares how Alteryx One and the Partner SE model enable MSPs to transition from infrastructure management to high-value data and AI services. From...
Claire Keelan, UK MD at Onnec, is warning that the UK will fall short of its AI ambitions and data centre expansion targets, unless it tackles the growing workforce shortage by tapping into underused talent...

Expert Opinions

By Leonardo Boscaro, EMEA Sales Leader, Nutanix Database.
By Errol Bull, P.E., CSI, Application Development Leader at Momentive Performance Materials Inc. Member: IIBEC, ASTM C24, ISO TC59/SC8.
By Jorge Monteiro, CEO of Ethiack.
By Lorri Janssen-Anessi, Director of External Cybersecurity Assessments, BlueVoyant