Going under cover to understand the hackers

Study reveals typical account takeover time, most sought after data, as well as lazy habits of attackers.

Read More
IT teams and the C-suite must work together to deliver comprehensive cyber-security

Cyber-security is rarely out of the news these days, with large businesses and organisation under attack. This is now increasingly moving to medium-sized organisations, who are also seeing their capital, reputation and intellectual property challenged by new and insidious threats. However,...

Read More
Thales strengthens its multi-cloud data security portfolio

New encryption, tokenisation and key management capabilities simplify control and ensure compliance over data security in multi-cloud environments.

Read More
Neustar introduces Integrated Security Platform

Neustar has introduced its new Integrated Security Platform, continuing to help organizations...

Read More
Businesses must be savvy to mobile security threats as app adoption spikes

Introducing adequate security into the software’s design at the initial building stage is crucial.

Read More
NETSCOUT enters the advanced threat Market

NETSCOUT ISNG platform and Arbor Networks Spectrum delivers smart data and analytics.

Read More
ForeScout partners with ServiceNow

ForeScout Extended Module for ServiceNow provides visibility and configuration monitoring for...

Read More
NEWS
Employees regarded as an organisation's greatest asset but also one of the biggest data security risks

What's keeping IT professionals awake at night? Data storage, data access and data sharing.

Read More
NEWS
As GDPR approaches, retail data breaches remain unacceptably high

Two in five retailers across the globe have experienced a data breach in the past year, according...

Read More
CIF enhances its Code of Practice to support GDPR compliance for CSPs

CIF provides the only certification for CSPs who want to better position themselves as GDPR ready.

Read More
NEWS
Consumers confused about encryption back doors

Sixty-five percent believe they shouldn’t be forced to hand over encrypted private data to...

Read More
Telehouse now offering Verisign DDoS Protection Services

Telehouse is now offering Verisign’s Distributed Denial of Service (DDoS) Protection Services...

Read More
69% of UK boards neglect GDPR compliance

IT decision-makers report inadequate levels of sponsorship from the C-suite despite the General...

Read More
NetWitness Suite redefines SIEM

Accelerates threat detection and response, provides additional depth of visibility, ...

Read More

Videos

Pete Hughes, Founder and Managing Director of Zalara Tech, shares how building a business in the age of AI shapes growth and delivery, and why success depends on understanding that AI is never a...
In this discussion, David Primor, CEO of Cynomi, and Dennis Boone, President of SlashBlue, explore why third-party risk management is rapidly becoming essential for MSPs and MSSPs. They share real-world...
As AI tools evolve into a rapidly growing digital workforce, organisations are being forced to rethink how they secure them. In this conversation, Steve Wilson, Chief AI Officer at Exabeam, explains why AI...
In this interview, Josh Ewing, VP of eNlighten Managed Services at Namos Solutions, discusses how managed services are evolving beyond traditional break-fix models towards value-led, outcome-focused delivery....

Expert Opinions

By Michael Poto - Product Manager - Global Chilled Water Systems at Vertiv.
By Danny Kirby (Senior Account Director at Cameo Services) and Iain Burton (Strategic Account Director at RTK Group).
Researchers developed a system that intelligently balances workloads to improve the efficiency of flash storage hardware in a data center.