NEWS
IT teams in a battle for file transfer security

While a majority of IT professionals believe the secure sharing and transferring of files is very important, more than half are using unsecure cloud-file sharing services.

Read More
Protecting customers from DDoS attacks

France-based SdV Plurim?dia, the leading hosting provider for the international media industry, has implemented the SmartWall® Threat Defense System (TDS) to protect its world-class data centers against DDoS attacks. With the Corero solution in place, SdV Plurim?dia brings an optimum...

Read More
NEWS
70% of world population will be mobile users

Since 2000, when the first camera phone was introduced, the number of mobile users has quintupled. By 2020, there will be 5.5 billion mobile users, representing 70 percent of the global population, according to the Cisco Visual Networking Index™ (VNI) Global Mobile Data Traffic...

Read More
Delivering Cloud-based Privileged Account Security to the endpoint

CyberArk has introduced new capabilities for CyberArk Viewfinity that deliver privileged account security to the endpoint. With CyberArk Viewfinity v5.5, customers can benefit from an enhanced, single privilege management and application control solution to reduce the attack surface while...

Read More
Enabling mobile productivity while protecting employee privacy

File encryption for data moving between mobile devices and cloud storage.

Read More
Lanware partners with Trend Micro

The firms are collaborating to offer fully outsourced cloud-based solutions that fit client needs.

Read More
EU Commission and United States agree on new framework for transatlantic data flows

The College of Commissioners approved the political agreement reached and has mandated...

Read More
Mitigating digital risk

Guidance Software has unveiled EnForce™ Risk Manager, a highly anticipated, new data risk and...

Read More
Cloud strategy supports customer concerns

Guidance Software has unveiled its cloud strategy. In a phased approach, the company will begin...

Read More
Centrify receives multiple application certifications from ServiceNow

Centrify has received three new certifications of its application integrations with ServiceNow®....

Read More
ForgeRock Identity Platform addresses evolving customer data privacy regulations

ForgeRock has introduced its newest identity management platform, including an implementation of...

Read More
27% of all recorded malware appeared in 2015

A total of 84 million new malware samples were record in 2015, an increase of 9 million...

Read More
Complete Cloud-based security solution

iSheriff Complete replaces point products for web, email and endpoint security.

Read More
Providing deeper vulnerability management

BeyondTrust has launched the latest version of the company’s enterprise vulnerability...

Read More
Cyber startup initiative

A new programme to support cyber security startups will help develop innovative technical...

Read More

Videos

In this video, DCS talks to Teksan at the DCA's 10x10 2025
Ben Miller, Product Marketing Manager at Keysight Technologies, discusses the Keysight Artificial Intelligence (KAI) architecture, a portfolio of end-to-end solutions designed to help customers scale...
Alexander Goodall, Founder & CEO at Xela Energy, talks through the company’s rebrand from Clean Energy Capital to Xela Energy, an Enterprise Independent Power Producer (EIPP) and a leading UK provider of...
Chris Carreiro, CTO, Park Place Technologies, explains why so many AI ambitions are faltering and how organisations can navigate this complex landscape. Core issues to address include the underestimation of...

Expert Opinions

By Rosemary J Thomas, Senior Technical Consultant, AI Labs, Version 1.
Eran Shiff, VP of Product from AlgoSec provides practical guidance to help organisations approach network convergence and consolidate security and cloud functionalities.
Dr Richard Lewis from Prysmian highlights the vital importance of power infrastructure.
By Nadeem Azhar, CEO of PC.Solutions.Net.